bin/ls/ls.c
764
const char *user, *group;
bin/ls/ls.c
874
user = nuser;
bin/ls/ls.c
877
user = user_from_uid(sp->st_uid, 0);
bin/ls/ls.c
887
if (user == NULL)
bin/ls/ls.c
894
if ((ulen = strlen(user)) > maxuser)
bin/ls/ls.c
970
np->user = &np->data[0];
bin/ls/ls.c
971
(void)strcpy(np->user, user);
bin/ls/ls.h
82
char *user;
bin/ls/print.c
239
(void)printf("%-*s ", dp->s_user, np->user);
bin/ps/keyword.c
394
const int user)
bin/ps/keyword.c
466
vent->flags = user ? VE_KEEP : 0;
bin/sh/expand.c
362
const char *user;
bin/sh/expand.c
388
user = expdest - len;
bin/sh/expand.c
389
if (*user == '\0') {
bin/sh/expand.c
392
pw = getpwnam(user);
crypto/heimdal/appl/ftp/ftp/cmdtab.c
185
{ "user", userhelp, 0, 1, 1, user },
crypto/heimdal/appl/ftp/ftp/extern.h
152
void user (int, char **);
crypto/heimdal/appl/ftp/ftp/security.c
587
sec_session(char *user)
crypto/heimdal/appl/ftp/ftp/security.c
590
return (*mech->session)(app_data, user);
crypto/heimdal/appl/ftp/ftpd/extern.h
100
void user(char *);
crypto/heimdal/appl/ftp/ftpd/ftpcmd.c
1781
user((yyvsp[(3) - (5)].s));
crypto/heimdal/appl/ftp/ftpd/ftpcmd.y
143
user($3);
crypto/heimdal/appl/ftp/ftpd/ftpd.c
670
char *user, *perm, line[BUFSIZ];
crypto/heimdal/appl/ftp/ftpd/ftpd.c
680
user = strtok_r(line, " \t\n", &foo);
crypto/heimdal/appl/ftp/ftpd/ftpd.c
681
if (user == NULL || user[0] == '#')
crypto/heimdal/appl/ftp/ftpd/ftpd.c
684
if (match(user, name) == 0){
crypto/heimdal/appl/ftp/ftpd/ls.c
222
if (asprintf(&file->user, "%u", (unsigned)st->st_uid) == -1)
crypto/heimdal/appl/ftp/ftpd/ls.c
223
file->user = NULL;
crypto/heimdal/appl/ftp/ftpd/ls.c
225
file->user = strdup(pwd->pw_name);
crypto/heimdal/appl/ftp/ftpd/ls.c
226
if (file->user == NULL) {
crypto/heimdal/appl/ftp/ftpd/ls.c
343
sec_fprintf2(out, "%-*s", max_user, f->user);
crypto/heimdal/appl/ftp/ftpd/ls.c
585
if(strlen(fi[i].user) > max_user)
crypto/heimdal/appl/ftp/ftpd/ls.c
586
max_user = strlen(fi[i].user);
crypto/heimdal/appl/ftp/ftpd/ls.c
77
char *user;
crypto/heimdal/appl/ftp/ftpd/ls.c
90
free(f->user);
crypto/heimdal/appl/ftp/ftpd/security.c
587
sec_session(char *user)
crypto/heimdal/appl/ftp/ftpd/security.c
590
return (*mech->session)(app_data, user);
crypto/heimdal/appl/gssmask/gssmaestro.c
753
char *user;
crypto/heimdal/appl/gssmask/gssmaestro.c
778
user = estrdup(principals.strings[0]);
crypto/heimdal/appl/gssmask/gssmaestro.c
779
password = strchr(user, ':');
crypto/heimdal/appl/gssmask/gssmaestro.c
781
errx(1, "password missing from %s", user);
crypto/heimdal/appl/gssmask/gssmaestro.c
816
val = acquire_cred(clients[i], user, password, 1, &hCred);
crypto/heimdal/appl/gssmask/gssmaestro.c
844
val = acquire_cred(c, user, password, 1, &hCred);
crypto/heimdal/appl/gssmask/gssmaestro.c
901
val = acquire_cred(client, user, password, 1, &hCred);
crypto/heimdal/appl/login/login_access.c
177
static int netgroup_match(char *group, char *machine, char *user)
crypto/heimdal/appl/login/login_access.c
184
return (innetgr(group, machine, user, mydomain));
crypto/heimdal/appl/login/login_access.c
195
char *string = item->user->pw_name;
crypto/heimdal/appl/login/login_access.c
217
if (item->user->pw_gid == group->gr_gid)
crypto/heimdal/appl/login/login_access.c
45
struct passwd *user;
crypto/heimdal/appl/login/login_access.c
57
int login_access(struct passwd *user, char *from)
crypto/heimdal/appl/login/login_access.c
73
item.user = user;
crypto/heimdal/appl/login/utmpx_login.c
26
int utmpx_login(char *line, const char *user, const char *host) { return 0; }
crypto/heimdal/appl/login/utmpx_login.c
30
utmpx_update(struct utmpx *ut, char *line, const char *user, const char *host)
crypto/heimdal/appl/login/utmpx_login.c
39
strncpy(ut->ut_user, user, sizeof(ut->ut_user));
crypto/heimdal/appl/login/utmpx_login.c
58
prepare_utmp (&utmp, line, user, host);
crypto/heimdal/appl/login/utmpx_login.c
68
utmpx_login(char *line, const char *user, const char *host)
crypto/heimdal/appl/login/utmpx_login.c
89
utmpx_update(&save_ut, line, user, host);
crypto/heimdal/appl/login/utmpx_login.c
99
utmpx_update(&newut, line, user, host);
crypto/heimdal/appl/push/push.c
206
const char *user,
crypto/heimdal/appl/push/push.c
245
fprintf (stderr, "%s@%s\n", user, host);
crypto/heimdal/appl/push/push.c
264
fprintf (stderr, "%s@%s -> %s\n", user, host, outfilename);
crypto/heimdal/appl/push/push.c
275
user);
crypto/heimdal/appl/push/push.c
517
const char *user,
crypto/heimdal/appl/push/push.c
563
return doit (s, host, user, filename, header_str, leavep, verbose, forkp);
crypto/heimdal/appl/push/push.c
572
hesiod_get_pobox (const char **user)
crypto/heimdal/appl/push/push.c
581
hpo = hesiod_getmailhost (context, *user);
crypto/heimdal/appl/push/push.c
583
warn ("hesiod_getmailhost %s", *user);
crypto/heimdal/appl/push/push.c
589
*user = estrdup(hpo->hesiod_po_name);
crypto/heimdal/appl/push/push.c
599
hesiod_get_pobox (const char **user)
crypto/heimdal/appl/push/push.c
604
hpo = hes_getmailhost (*user);
crypto/heimdal/appl/push/push.c
606
warn ("hes_getmailhost %s", *user);
crypto/heimdal/appl/push/push.c
612
*user = estrdup(hpo->po_name);
crypto/heimdal/appl/push/push.c
622
get_pobox (const char **user)
crypto/heimdal/appl/push/push.c
627
ret = hesiod_get_pobox (user);
crypto/heimdal/appl/push/push.c
638
parse_pobox (char *a0, const char **host, const char **user)
crypto/heimdal/appl/push/push.c
646
*user = getenv ("USERNAME");
crypto/heimdal/appl/push/push.c
647
if (*user == NULL) {
crypto/heimdal/appl/push/push.c
652
*user = estrdup (pwd->pw_name);
crypto/heimdal/appl/push/push.c
654
*host = get_pobox (user);
crypto/heimdal/appl/push/push.c
692
*user = u;
crypto/heimdal/appl/push/push.c
701
const char *host, *user, *filename = NULL;
crypto/heimdal/appl/push/push.c
776
parse_pobox (pobox, &host, &user);
crypto/heimdal/appl/push/push.c
780
ret = do_v5 (host, port, user, filename, header_str,
crypto/heimdal/appl/rsh/login_access.c
177
static int netgroup_match(char *group, char *machine, char *user)
crypto/heimdal/appl/rsh/login_access.c
184
return (innetgr(group, machine, user, mydomain));
crypto/heimdal/appl/rsh/login_access.c
195
char *string = item->user->pw_name;
crypto/heimdal/appl/rsh/login_access.c
217
if (item->user->pw_gid == group->gr_gid)
crypto/heimdal/appl/rsh/login_access.c
45
struct passwd *user;
crypto/heimdal/appl/rsh/login_access.c
57
int login_access(struct passwd *user, char *from)
crypto/heimdal/appl/rsh/login_access.c
73
item.user = user;
crypto/heimdal/appl/rsh/rsh.c
1024
user, local_user,
crypto/heimdal/appl/rsh/rsh.c
63
static const char *user;
crypto/heimdal/appl/rsh/rsh.c
809
{ "user", 'l', arg_string, &user, "Run as this user", "login" },
crypto/heimdal/appl/rsh/rsh.c
954
user = host;
crypto/heimdal/appl/rsh/rsh.c
970
if (user == NULL)
crypto/heimdal/appl/rsh/rsh.c
971
user = local_user;
crypto/heimdal/appl/rsh/rsh.c
997
ret = doit (host, ai, user, local_user, cmd, cmd_len,
crypto/heimdal/appl/rsh/rshd.c
39
login_access( struct passwd *user, char *from);
crypto/heimdal/appl/su/su.c
274
group_member_p(const char *group, const char *user)
crypto/heimdal/appl/su/su.c
284
if(strcmp(user, g->gr_mem[i]) == 0)
crypto/heimdal/appl/telnet/telnet/commands.c
2057
char *user = 0;
crypto/heimdal/appl/telnet/telnet/commands.c
2083
user = strdup(*argv++);
crypto/heimdal/appl/telnet/telnet/commands.c
2251
if (autologin && user == NULL)
crypto/heimdal/appl/telnet/telnet/commands.c
2252
user = (char *)get_default_username ();
crypto/heimdal/appl/telnet/telnet/commands.c
2253
if (user) {
crypto/heimdal/appl/telnet/telnet/commands.c
2254
env_define((unsigned char *)"USER", (unsigned char *)user);
crypto/heimdal/appl/telnet/telnet/commands.c
2259
my_telnet((char *)user);
crypto/heimdal/appl/telnet/telnet/main.c
160
char *user;
crypto/heimdal/appl/telnet/telnet/main.c
177
user = NULL;
crypto/heimdal/appl/telnet/telnet/main.c
287
user = optarg;
crypto/heimdal/appl/telnet/telnet/main.c
338
if (user) {
crypto/heimdal/appl/telnet/telnet/main.c
340
*argp++ = user;
crypto/heimdal/appl/telnet/telnet/telnet.c
2036
my_telnet(char *user)
crypto/heimdal/appl/telnet/telnet/telnet.c
2052
auth_encrypt_user(user);
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1278
char *user;
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1337
user = name;
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1339
user = getenv("USER");
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1355
host, user ? user : "unknown user");
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1360
if(user){
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1362
addarg(&argv, strdup(user));
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1826
jobend(jid, path, user)
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1829
char *user;
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1855
strlcpy(saved_user, user, sizeof(saved_user));
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1886
cleantmpdir(jid, tpath, user)
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1889
char *user;
crypto/heimdal/appl/telnet/telnetd/sys_term.c
1897
execl(CLEANTMPCMD, CLEANTMPCMD, user, tpath, NULL);
crypto/heimdal/kcm/protocol.c
1225
char *user;
crypto/heimdal/kcm/protocol.c
1238
free(cred->user);
crypto/heimdal/kcm/protocol.c
1255
find_ntlm_cred(const char *user, const char *domain, kcm_client *client)
crypto/heimdal/kcm/protocol.c
1260
if ((user[0] == '\0' || strcmp(user, c->user) == 0) &&
crypto/heimdal/kcm/protocol.c
1284
ret = krb5_ret_stringz(request, &cred->user);
crypto/heimdal/kcm/protocol.c
1297
c = find_ntlm_cred(cred->user, cred->domain, client);
crypto/heimdal/kcm/protocol.c
1339
char *user = NULL, *domain = NULL;
crypto/heimdal/kcm/protocol.c
1342
ret = krb5_ret_stringz(request, &user);
crypto/heimdal/kcm/protocol.c
1355
c = find_ntlm_cred(user, domain, client);
crypto/heimdal/kcm/protocol.c
1360
free(user);
crypto/heimdal/kcm/protocol.c
1383
char *user = NULL, *domain = NULL;
crypto/heimdal/kcm/protocol.c
1386
ret = krb5_ret_stringz(request, &user);
crypto/heimdal/kcm/protocol.c
1395
if (strcmp(user, (*cp)->user) == 0 && strcmp(domain, (*cp)->domain) == 0 &&
crypto/heimdal/kcm/protocol.c
1407
free(user);
crypto/heimdal/kcm/protocol.c
1441
char *user = NULL, *domain = NULL;
crypto/heimdal/kcm/protocol.c
1452
ret = krb5_ret_stringz(request, &user);
crypto/heimdal/kcm/protocol.c
1465
c = find_ntlm_cred(user, domain, client);
crypto/heimdal/kcm/protocol.c
1488
type3.username = c->user;
crypto/heimdal/kcm/protocol.c
1652
free(user);
crypto/heimdal/kcm/protocol.c
1685
ret = krb5_store_stringz(response, c->user);
crypto/heimdal/kdc/digest-service.c
114
HDB_F_GET_CLIENT, NULL, NULL, &user);
crypto/heimdal/kdc/digest-service.c
119
ret = hdb_enctype2key(context, &user->entry,
crypto/heimdal/kdc/digest-service.c
213
if (user)
crypto/heimdal/kdc/digest-service.c
214
_kdc_free_ent (context, user);
crypto/heimdal/kdc/digest-service.c
61
hdb_entry_ex *user = NULL;
crypto/heimdal/kdc/digest.c
1161
HDB_F_GET_CLIENT, NULL, NULL, &user);
crypto/heimdal/kdc/digest.c
1212
ret = hdb_enctype2key(context, &user->entry,
crypto/heimdal/kdc/digest.c
1497
if (user)
crypto/heimdal/kdc/digest.c
1498
_kdc_free_ent (context, user);
crypto/heimdal/kdc/digest.c
171
hdb_entry_ex *user;
crypto/heimdal/kdc/digest.c
180
HDB_F_GET_CLIENT, NULL, &db, &user);
crypto/heimdal/kdc/digest.c
185
ret = hdb_entry_get_password(context, db, &user->entry, password);
crypto/heimdal/kdc/digest.c
191
memset(user, 0, sizeof(*user));
crypto/heimdal/kdc/digest.c
193
_kdc_free_ent (context, user);
crypto/heimdal/kdc/digest.c
220
hdb_entry_ex *server = NULL, *user = NULL;
crypto/heimdal/kdc/digest.c
877
HDB_F_GET_CLIENT, NULL, NULL, &user);
crypto/heimdal/kdc/digest.c
886
ret = hdb_enctype2key(context, &user->entry,
crypto/heimdal/lib/gssapi/gssapi/gssapi.h
1043
const gss_name_t user);
crypto/heimdal/lib/gssapi/gssapi/gssapi.h
1047
const char *user);
crypto/heimdal/lib/gssapi/krb5/authorize_localname.c
43
char *user;
crypto/heimdal/lib/gssapi/krb5/authorize_localname.c
51
user = malloc(user_name->length + 1);
crypto/heimdal/lib/gssapi/krb5/authorize_localname.c
52
if (user == NULL) {
crypto/heimdal/lib/gssapi/krb5/authorize_localname.c
57
memcpy(user, user_name->value, user_name->length);
crypto/heimdal/lib/gssapi/krb5/authorize_localname.c
58
user[user_name->length] = '\0';
crypto/heimdal/lib/gssapi/krb5/authorize_localname.c
61
user_ok = krb5_kuserok(context, princ, user);
crypto/heimdal/lib/gssapi/krb5/authorize_localname.c
63
free(user);
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
102
value.length == user->gn_value.length &&
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
103
memcmp(value.value, user->gn_value.value, user->gn_value.length) == 0)
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
123
const struct _gss_name *user = (const struct _gss_name *) gss_user;
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
137
if (HEIM_SLIST_FIRST(&user->gn_mn) != NULL)
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
142
major_status = mech_authorize_localname(minor_status, name, user);
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
149
major_status = attr_authorize_localname(minor_status, name, user);
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
168
const char *user)
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
174
userBuf.value = (void *)user;
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
175
userBuf.length = strlen(user);
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
43
const struct _gss_name *user)
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
58
&user->gn_value,
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
59
&user->gn_type);
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
73
const struct _gss_name *user)
crypto/heimdal/lib/gssapi/mech/gss_authorize_localname.c
78
if (!gss_oid_equal(&user->gn_type, GSS_C_NT_USER_NAME))
crypto/heimdal/lib/gssapi/ntlm/accept_sec_context.c
206
n->user = strdup(type3.username);
crypto/heimdal/lib/gssapi/ntlm/accept_sec_context.c
209
if (n == NULL || n->user == NULL || n->domain == NULL) {
crypto/heimdal/lib/gssapi/ntlm/creds.c
59
n->user = strdup(c->username);
crypto/heimdal/lib/gssapi/ntlm/creds.c
62
if (n == NULL || n->user == NULL || n->domain == NULL) {
crypto/heimdal/lib/gssapi/ntlm/creds.c
64
free(n->user);
crypto/heimdal/lib/gssapi/ntlm/display_name.c
62
len = asprintf(&str, "%s@%s", n->user, n->domain);
crypto/heimdal/lib/gssapi/ntlm/import_name.c
101
if (n->user == NULL || n->domain == NULL) {
crypto/heimdal/lib/gssapi/ntlm/import_name.c
102
free(n->user);
crypto/heimdal/lib/gssapi/ntlm/import_name.c
96
n->user = strdup(name);
crypto/heimdal/lib/gssapi/ntlm/iter_cred.c
64
char *user = NULL, *domain = NULL;
crypto/heimdal/lib/gssapi/ntlm/iter_cred.c
72
ret = krb5_ret_stringz(response, &user);
crypto/heimdal/lib/gssapi/ntlm/iter_cred.c
76
free(user);
crypto/heimdal/lib/gssapi/ntlm/iter_cred.c
82
free(user);
crypto/heimdal/lib/gssapi/ntlm/iter_cred.c
86
dn->username = user;
crypto/heimdal/lib/gssapi/ntlm/ntlm.h
138
char *user;
crypto/heimdal/lib/gssapi/ntlm/release_name.c
47
free(n->user);
crypto/heimdal/lib/gssapi/test_ntlm.c
111
type3.username = rk_UNCONST(user);
crypto/heimdal/lib/gssapi/test_ntlm.c
176
const char *user = "foo",
crypto/heimdal/lib/gssapi/test_ntlm.c
235
type3.username = rk_UNCONST(user);
crypto/heimdal/lib/gssapi/test_ntlm.c
246
user,
crypto/heimdal/lib/gssapi/test_ntlm.c
49
const char *user = "foo",
crypto/heimdal/lib/ipc/server.c
1046
void *user, heim_sipc *ctx)
crypto/heimdal/lib/ipc/server.c
1056
c = add_new_socket(fd, LISTEN_SOCKET|WAITING_READ|INCLUDE_ERROR_CODE, callback, user);
crypto/heimdal/lib/ipc/server.c
1059
c = add_new_socket(fd, LISTEN_SOCKET|WAITING_READ, callback, user);
crypto/heimdal/lib/ipc/server.c
1063
c = add_new_socket(fd, LISTEN_SOCKET|WAITING_READ|ALLOW_HTTP, callback, user);
crypto/heimdal/lib/ipc/server.c
1084
void *user, heim_sipc *ctx)
crypto/heimdal/lib/ipc/server.c
1120
callback, user, ctx);
crypto/heimdal/lib/ipc/server.c
405
void *user, heim_sipc *ctx)
crypto/heimdal/lib/ipc/server.c
426
c->userctx = user;
crypto/heimdal/lib/kadm5/init_c.c
355
const char *user;
crypto/heimdal/lib/kadm5/init_c.c
357
user = get_default_username ();
crypto/heimdal/lib/kadm5/init_c.c
359
if(user == NULL) {
crypto/heimdal/lib/kadm5/init_c.c
364
NULL, user, "admin", NULL);
crypto/heimdal/lib/kafs/common.c
343
_kafs_try_get_cred(struct kafs_data *data, const char *user, const char *cell,
crypto/heimdal/lib/kafs/common.c
348
ret = (*data->get_cred)(data, user, cell, realm, uid, kt);
crypto/heimdal/lib/krb5/get_default_principal.c
43
const char *user = getenv("USER");
crypto/heimdal/lib/krb5/get_default_principal.c
44
if(user == NULL)
crypto/heimdal/lib/krb5/get_default_principal.c
45
user = getenv("LOGNAME");
crypto/heimdal/lib/krb5/get_default_principal.c
46
if(user == NULL)
crypto/heimdal/lib/krb5/get_default_principal.c
47
user = getenv("USERNAME");
crypto/heimdal/lib/krb5/get_default_principal.c
48
return user;
crypto/heimdal/lib/krb5/get_default_principal.c
64
const char *user;
crypto/heimdal/lib/krb5/get_default_principal.c
71
user = getlogin();
crypto/heimdal/lib/krb5/get_default_principal.c
72
if(user == NULL)
crypto/heimdal/lib/krb5/get_default_principal.c
73
user = get_env_user();
crypto/heimdal/lib/krb5/get_default_principal.c
74
if(user != NULL && strcmp(user, "root") != 0)
crypto/heimdal/lib/krb5/get_default_principal.c
75
ret = krb5_make_principal(context, princ, NULL, user, "root", NULL);
crypto/heimdal/lib/krb5/get_default_principal.c
81
user = pw->pw_name;
crypto/heimdal/lib/krb5/get_default_principal.c
83
user = get_env_user();
crypto/heimdal/lib/krb5/get_default_principal.c
84
if(user == NULL)
crypto/heimdal/lib/krb5/get_default_principal.c
85
user = getlogin();
crypto/heimdal/lib/krb5/get_default_principal.c
87
if(user == NULL) {
crypto/heimdal/lib/krb5/get_default_principal.c
93
ret = krb5_make_principal(context, princ, NULL, user, NULL);
crypto/heimdal/lib/krb5/test_alname.c
104
char *user;
crypto/heimdal/lib/krb5/test_alname.c
125
user = argv[0];
crypto/heimdal/lib/krb5/test_alname.c
135
test_alname(context, realm, user, NULL, user, 1);
crypto/heimdal/lib/krb5/test_alname.c
136
test_alname(context, realm, user, "root", "root", 1);
crypto/heimdal/lib/krb5/test_alname.c
138
test_alname(context, "FOO.BAR.BAZ.KAKA", user, NULL, user, 0);
crypto/heimdal/lib/krb5/test_alname.c
139
test_alname(context, "FOO.BAR.BAZ.KAKA", user, "root", "root", 0);
crypto/heimdal/lib/krb5/test_alname.c
141
test_alname(context, realm, user, NULL,
crypto/heimdal/lib/krb5/test_alname.c
143
test_alname(context, realm, user, "root",
crypto/heimdal/lib/krb5/test_alname.c
146
test_alname(context, "FOO.BAR.BAZ.KAKA", user, NULL,
crypto/heimdal/lib/krb5/test_alname.c
148
test_alname(context, "FOO.BAR.BAZ.KAKA", user, "root",
crypto/heimdal/lib/krb5/test_alname.c
39
const char *user, const char *inst,
crypto/heimdal/lib/krb5/test_alname.c
47
ret = krb5_make_principal(context, &p, realm, user, inst, NULL);
crypto/heimdal/lib/krb5/test_pac.c
176
ret = krb5_parse_name_flags(context, user,
crypto/heimdal/lib/krb5/test_pac.c
96
static const char *user = "w2003final$";
crypto/heimdal/lib/ntlm/test_ntlm.c
112
type3.username = rk_UNCONST(user);
crypto/heimdal/lib/ntlm/test_ntlm.c
145
if (strcmp(user, type3.username) != 0)
crypto/heimdal/lib/ntlm/test_ntlm.c
47
const char *user = "foo",
crypto/heimdal/lib/roken/get_default_username.c
46
const char *user;
crypto/heimdal/lib/roken/get_default_username.c
48
user = getenv ("USER");
crypto/heimdal/lib/roken/get_default_username.c
49
if (user == NULL)
crypto/heimdal/lib/roken/get_default_username.c
50
user = getenv ("LOGNAME");
crypto/heimdal/lib/roken/get_default_username.c
51
if (user == NULL)
crypto/heimdal/lib/roken/get_default_username.c
52
user = getenv ("USERNAME");
crypto/heimdal/lib/roken/get_default_username.c
55
if (user == NULL) {
crypto/heimdal/lib/roken/get_default_username.c
56
user = (const char *)getlogin ();
crypto/heimdal/lib/roken/get_default_username.c
57
if (user != NULL)
crypto/heimdal/lib/roken/get_default_username.c
58
return user;
crypto/heimdal/lib/roken/get_default_username.c
66
if (user != NULL) {
crypto/heimdal/lib/roken/get_default_username.c
67
pwd = k_getpwnam (user);
crypto/heimdal/lib/roken/get_default_username.c
69
return user;
crypto/heimdal/lib/roken/get_default_username.c
82
return user;
crypto/heimdal/lib/roken/innetgr.c
40
const char *user, const char *domain)
crypto/heimdal/lib/roken/iruserok.c
134
user = p;
crypto/heimdal/lib/roken/iruserok.c
139
user = p;
crypto/heimdal/lib/roken/iruserok.c
171
switch(*user) {
crypto/heimdal/lib/roken/iruserok.c
173
if (!*(user+1)) { /* '+' matches all users */
crypto/heimdal/lib/roken/iruserok.c
177
if (*(user+1) == '@') /* match a user by netgroup */
crypto/heimdal/lib/roken/iruserok.c
178
userok = innetgr(user+2, NULL, (char *)ruser,
crypto/heimdal/lib/roken/iruserok.c
181
userok = !(strcmp(ruser, user+1));
crypto/heimdal/lib/roken/iruserok.c
185
if (!*(user+1))
crypto/heimdal/lib/roken/iruserok.c
187
if (*(user+1) == '@') {
crypto/heimdal/lib/roken/iruserok.c
188
if (innetgr(user+2, NULL,
crypto/heimdal/lib/roken/iruserok.c
192
if (!strcmp(ruser, user+1))
crypto/heimdal/lib/roken/iruserok.c
199
userok = !(strcmp(ruser,*user ? user : luser));
crypto/heimdal/lib/roken/iruserok.c
92
char *user, *p;
crypto/heimdal/lib/roken/k_getpwnam.c
42
k_getpwnam (const char *user)
crypto/heimdal/lib/roken/k_getpwnam.c
46
p = getpwnam (user);
crypto/heimdal/lib/roken/k_getpwnam.c
52
spwd = getspnam (user);
crypto/heimdal/lib/roken/verify.c
46
unix_verify_user(char *user, char *password)
crypto/heimdal/lib/roken/verify.c
50
pw = k_getpwnam(user);
crypto/krb5/src/ccapi/common/win/win-utils.c
56
char* serverEndpoint(const char* user) {
crypto/krb5/src/ccapi/common/win/win-utils.c
57
char* _serverEndpoint = (char*)malloc(strlen(user) + strlen(serverPrefix) + 2);
crypto/krb5/src/ccapi/common/win/win-utils.c
59
strncat(_serverEndpoint, user, UUID_SIZE);
crypto/krb5/src/include/k5-int.h
759
krb5_principal user;
crypto/krb5/src/include/k5-int.h
766
krb5_principal user;
crypto/krb5/src/kdc/do_tgs_req.c
699
au_state->s4u2self_user = t->s4u2self->user_id.user;
crypto/krb5/src/kdc/do_tgs_req.c
708
t->s4u_cprinc = t->s4u2self->user_id.user;
crypto/krb5/src/kdc/kdc_util.c
1253
for (i = 0; i < krb5_princ_size(context, req->user); i++) {
crypto/krb5/src/kdc/kdc_util.c
1254
data.length += krb5_princ_component(context, req->user, i)->length;
crypto/krb5/src/kdc/kdc_util.c
1256
data.length += krb5_princ_realm(context, req->user)->length;
crypto/krb5/src/kdc/kdc_util.c
1264
name_type = krb5_princ_type(context, req->user);
crypto/krb5/src/kdc/kdc_util.c
1271
for (i = 0; i < krb5_princ_size(context, req->user); i++) {
crypto/krb5/src/kdc/kdc_util.c
1272
if (krb5_princ_component(context, req->user, i)->length > 0) {
crypto/krb5/src/kdc/kdc_util.c
1273
memcpy(p, krb5_princ_component(context, req->user, i)->data,
crypto/krb5/src/kdc/kdc_util.c
1274
krb5_princ_component(context, req->user, i)->length);
crypto/krb5/src/kdc/kdc_util.c
1276
p += krb5_princ_component(context, req->user, i)->length;
crypto/krb5/src/kdc/kdc_util.c
1279
if (krb5_princ_realm(context, req->user)->length > 0) {
crypto/krb5/src/kdc/kdc_util.c
1280
memcpy(p, krb5_princ_realm(context, req->user)->data,
crypto/krb5/src/kdc/kdc_util.c
1281
krb5_princ_realm(context, req->user)->length);
crypto/krb5/src/kdc/kdc_util.c
1283
p += krb5_princ_realm(context, req->user)->length;
crypto/krb5/src/kdc/kdc_util.c
1339
(*s4u_x509_user)->user_id.user = for_user->user;
crypto/krb5/src/kdc/kdc_util.c
1340
for_user->user = NULL;
crypto/krb5/src/kdc/kdc_util.c
1441
if (krb5_princ_size(context, (*s4u_x509_user)->user_id.user) == 0 &&
crypto/krb5/src/kdc/kdc_util.c
1470
rep_s4u_user.user_id.user = req_s4u_user->user_id.user;
crypto/krb5/src/kdc/kdc_util.c
1590
if (data_eq(server->princ->realm, id->user->realm)) {
crypto/krb5/src/kdc/kdc_util.c
1593
&id->subject_cert, id->user,
crypto/krb5/src/kdc/kdc_util.c
1596
if (code == 0 && id->user->length == 0) {
crypto/krb5/src/kdc/kdc_util.c
1597
krb5_free_principal(context, id->user);
crypto/krb5/src/kdc/kdc_util.c
1598
code = krb5_copy_principal(context, princ->princ, &id->user);
crypto/krb5/src/kdc/kdc_util.c
1601
code = krb5_db_get_principal(context, id->user,
crypto/krb5/src/kdc/tgs_policy.c
319
if (client == NULL && s4u_x509_user->user_id.user->length == 0) {
crypto/krb5/src/kdc/tgs_policy.c
350
s4u_x509_user->user_id.user, NULL, NULL,
crypto/krb5/src/lib/gssapi/generic/gssapi_ext.h
102
const gss_name_t user);
crypto/krb5/src/lib/gssapi/krb5/gssapi_krb5.c
782
char *user;
crypto/krb5/src/lib/gssapi/krb5/gssapi_krb5.c
798
user = k5memdup0(local_user->value, local_user->length, &code);
crypto/krb5/src/lib/gssapi/krb5/gssapi_krb5.c
799
if (user == NULL) {
crypto/krb5/src/lib/gssapi/krb5/gssapi_krb5.c
805
user_ok = krb5_kuserok(context, kname->princ, user);
crypto/krb5/src/lib/gssapi/krb5/gssapi_krb5.c
807
free(user);
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
42
const krb5_gss_name_t user,
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
56
if (user->is_cert)
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
57
subject_cert = user->princ->data;
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
59
in_creds.client = user->princ;
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
65
k5_mutex_lock(&user->lock);
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
67
if (user->ad_context != NULL) {
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
69
user->ad_context,
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
73
k5_mutex_unlock(&user->lock);
crypto/krb5/src/lib/gssapi/krb5/s4u_gss_glue.c
79
k5_mutex_unlock(&user->lock);
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
133
const gss_name_t user)
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
141
user,
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
162
const gss_name_t user)
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
174
if (name == GSS_C_NO_NAME || user == GSS_C_NO_NAME)
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
178
unionUser = (gss_union_name_t)user;
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
208
const char *user)
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
214
userBuf.value = (void *)user;
crypto/krb5/src/lib/gssapi/mechglue/g_authorize_localname.c
215
userBuf.length = strlen(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
1005
mpol_test_fail(char *user, kadm5_policy_ent_t ent, uint32_t mask,
crypto/krb5/src/lib/kadm5/t_kadm5.c
1008
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
1095
mprinc_test_fail(char *user, kadm5_principal_ent_t ent, uint32_t mask,
crypto/krb5/src/lib/kadm5/t_kadm5.c
1098
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
1105
mprinc_test_compare(char *user, kadm5_principal_ent_t ent, uint32_t mask)
crypto/krb5/src/lib/kadm5/t_kadm5.c
1107
mprinc_test_fail(user, ent, mask, 0);
crypto/krb5/src/lib/kadm5/t_kadm5.c
1221
rnd_test_fail(char *user, krb5_principal princ, krb5_error_code code)
crypto/krb5/src/lib/kadm5/t_kadm5.c
1223
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
1230
rnd_test_succeed(char *user, krb5_principal princ)
crypto/krb5/src/lib/kadm5/t_kadm5.c
1232
rnd_test_fail(user, princ, 0);
crypto/krb5/src/lib/kadm5/t_kadm5.c
247
kinit(krb5_ccache cc, const char *user, const char *pass, const char *service)
crypto/krb5/src/lib/kadm5/t_kadm5.c
250
krb5_principal client = parse_princ(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
263
cpw_test_fail(char *user, krb5_principal princ, char *pass,
crypto/krb5/src/lib/kadm5/t_kadm5.c
266
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
273
cpw_test_succeed(char *user, krb5_principal princ, char *pass)
crypto/krb5/src/lib/kadm5/t_kadm5.c
275
cpw_test_fail(user, princ, pass, 0);
crypto/krb5/src/lib/kadm5/t_kadm5.c
319
cpol_test_fail(char *user, kadm5_policy_ent_t ent, uint32_t mask,
crypto/krb5/src/lib/kadm5/t_kadm5.c
322
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
329
cpol_test_compare(char *user, kadm5_policy_ent_t ent, uint32_t mask)
crypto/krb5/src/lib/kadm5/t_kadm5.c
331
cpol_test_fail(user, ent, mask, 0);
crypto/krb5/src/lib/kadm5/t_kadm5.c
423
cprinc_test_fail(char *user, kadm5_principal_ent_t ent, uint32_t mask,
crypto/krb5/src/lib/kadm5/t_kadm5.c
426
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
434
cprinc_test_compare(char *user, kadm5_principal_ent_t ent, uint32_t mask,
crypto/krb5/src/lib/kadm5/t_kadm5.c
437
cprinc_test_fail(user, ent, mask, pass, 0);
crypto/krb5/src/lib/kadm5/t_kadm5.c
523
dpol_test_fail(char *user, char *name, krb5_error_code code)
crypto/krb5/src/lib/kadm5/t_kadm5.c
525
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
532
dpol_test_succeed(char *user, char *name)
crypto/krb5/src/lib/kadm5/t_kadm5.c
534
dpol_test_fail(user, name, 0);
crypto/krb5/src/lib/kadm5/t_kadm5.c
575
dprinc_test_fail(char *user, krb5_principal princ, krb5_error_code code)
crypto/krb5/src/lib/kadm5/t_kadm5.c
577
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
584
dprinc_test_succeed(char *user, krb5_principal princ)
crypto/krb5/src/lib/kadm5/t_kadm5.c
586
dprinc_test_fail(user, princ, 0);
crypto/krb5/src/lib/kadm5/t_kadm5.c
619
gpol_test_succeed(char *user, char *name)
crypto/krb5/src/lib/kadm5/t_kadm5.c
621
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
631
gpol_test_fail(char *user, char *name, krb5_error_code code)
crypto/krb5/src/lib/kadm5/t_kadm5.c
633
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
663
gprinc_test_succeed(char *user, krb5_principal princ)
crypto/krb5/src/lib/kadm5/t_kadm5.c
665
void *handle = get_handle(user);
crypto/krb5/src/lib/kadm5/t_kadm5.c
676
gprinc_test_fail(char *user, krb5_principal princ, krb5_error_code code)
crypto/krb5/src/lib/kadm5/t_kadm5.c
678
void *handle = get_handle(user);
crypto/krb5/src/lib/krb5/asn.1/asn1_k_encode.c
950
DEFFIELD(pa_for_user_0, krb5_pa_for_user, user, 0, principal);
crypto/krb5/src/lib/krb5/asn.1/asn1_k_encode.c
951
DEFFIELD(pa_for_user_1, krb5_pa_for_user, user, 1, realm_of_principal);
crypto/krb5/src/lib/krb5/asn.1/asn1_k_encode.c
970
DEFFIELD(s4u_userid_1, krb5_s4u_userid, user, 1, opt_s4u_principal);
crypto/krb5/src/lib/krb5/asn.1/asn1_k_encode.c
971
DEFFIELD(s4u_userid_2, krb5_s4u_userid, user, 2, realm_of_principal);
crypto/krb5/src/lib/krb5/krb/kfree.c
620
krb5_free_principal(context, req->user);
crypto/krb5/src/lib/krb5/krb/kfree.c
621
req->user = NULL;
crypto/krb5/src/lib/krb5/krb/kfree.c
633
krb5_free_principal(context, user_id->user);
crypto/krb5/src/lib/krb5/krb/kfree.c
634
user_id->user = NULL;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
102
for (i = 0; i < req->user->length; i++)
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
103
data.length += req->user->data[i].length;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
104
data.length += req->user->realm.length;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
111
p[0] = (req->user->type >> 0) & 0xFF;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
112
p[1] = (req->user->type >> 8) & 0xFF;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
113
p[2] = (req->user->type >> 16) & 0xFF;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
114
p[3] = (req->user->type >> 24) & 0xFF;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
117
for (i = 0; i < req->user->length; i++) {
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
118
if (req->user->data[i].length > 0)
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
119
memcpy(p, req->user->data[i].data, req->user->data[i].length);
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
120
p += req->user->data[i].length;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
123
if (req->user->realm.length > 0)
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
124
memcpy(p, req->user->realm.data, req->user->realm.length);
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
125
p += req->user->realm.length;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
152
if (userid->user == NULL)
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
156
for_user.user = userid->user;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
342
if (rep_s4u_user->user_id.user == NULL ||
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
343
rep_s4u_user->user_id.user->length == 0) {
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
349
krb5_free_principal(context, req_s4u_user->user_id.user);
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
350
code = krb5_copy_principal(context, rep_s4u_user->user_id.user,
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
351
&req_s4u_user->user_id.user);
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
354
} else if (!krb5_principal_compare(context, rep_s4u_user->user_id.user,
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
355
req_s4u_user->user_id.user)) {
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
446
&s4u_user.user_id.user,
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
454
s4u_user.user_id.user->type = KRB5_NT_ENTERPRISE_PRINCIPAL;
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
458
&s4u_user.user_id.user);
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
463
code = krb5_build_principal_ext(context, &s4u_user.user_id.user,
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
532
if (s4u_user.user_id.user != NULL && s4u_user.user_id.user->length) {
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
600
s4u_user.user_id.user))
crypto/krb5/src/lib/krb5/krb/s4u_creds.c
641
krb5_free_principal(context, s4u_user.user_id.user);
crypto/krb5/src/lib/krb5/krb/t_expire_warn.c
64
char *user, *password, *service = NULL;
crypto/krb5/src/lib/krb5/krb/t_expire_warn.c
74
user = argv[1];
crypto/krb5/src/lib/krb5/krb/t_expire_warn.c
87
check(krb5_parse_name(ctx, user, &client));
crypto/krb5/src/lib/krb5/krb/t_in_ccache.c
127
if (asprintf(&perr, "Error parsing principal name \"%s\"", user) < 0)
crypto/krb5/src/lib/krb5/krb/t_in_ccache.c
129
bail_on_err(ctx, perr, krb5_parse_name(ctx, user, &client));
crypto/krb5/src/lib/krb5/krb/t_in_ccache.c
72
char *user, *password, *armor_ccname = NULL, *in_ccname = NULL, *perr;
crypto/krb5/src/lib/krb5/krb/t_in_ccache.c
95
user = argv[optind];
crypto/krb5/src/lib/krb5/krb/t_pac.c
838
ret = krb5_parse_name(context, user, &p);
crypto/krb5/src/lib/krb5/krb/t_pac.c
969
ret = krb5_parse_name_flags(context, user,
crypto/krb5/src/lib/krb5/krb/t_pac.c
99
static const char *user = "w2003final$@WIN2K3.THINKER.LOCAL";
crypto/krb5/src/plugins/kdb/db2/libdb2/test/btree.tests/main.c
129
void user __P((DB *));
crypto/krb5/src/plugins/kdb/db2/libdb2/test/btree.tests/main.c
250
user(db);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c
1422
char *policydn = NULL, *pwdpolicydn = NULL, *polname = NULL, *user = NULL;
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c
1439
ret = krb5_unparse_name(context, princ, &user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c
1445
if (strcasecmp(pnvalues[i], user) == 0) {
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_misc.c
1699
krb5_free_unparsed_name(context, user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
283
char *user=NULL, *DN=NULL, *strval[10] = {NULL};
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
326
st = krb5_ldap_unparse_name(context, searchfor, &user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
331
strval[0] = user;
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
385
if (user)
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal.c
386
free (user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
110
int scope, const char *filter, const char *user,
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
1200
strval[0] = user;
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
127
user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
1521
if (user)
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
1522
free(user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
155
char *user = NULL, *filtuser = NULL, *filter = NULL;
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
161
st = krb5_ldap_unparse_name(context, princ, &user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
165
filtuser = ldap_filter_correct(user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
179
LDAP_SCOPE_BASE, filter, user, entry_out, result_out);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
190
filter, user, entry_out, result_out);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
196
free(user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
794
char **canon = NULL, **names = NULL, *user = NULL, *dn = NULL;
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
834
st = krb5_ldap_unparse_name(context, alias, &user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
837
strval[0] = user;
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
860
krb5_free_unparsed_name(context, user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
875
char *user=NULL, *subtree=NULL, *principal_dn=NULL;
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
925
st = krb5_ldap_unparse_name(context, entry->princ, &user);
crypto/krb5/src/plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c
928
filtuser = ldap_filter_correct(user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
212
char *user = NULL;
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
220
retval = krb5_unparse_name(context, client->princ, &user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
253
user ? user : def_user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
264
user ? user : def_user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
268
free(user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
289
char *cp, *user = NULL;
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
298
retval = krb5_unparse_name(context, client->princ, &user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
310
user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
321
user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
330
user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
343
"while decrypting SAD in verify_securid_data_2 (%s)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
350
"while decoding SAD in verify_securid_data_2 (%s)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
357
"while checking nonce in verify_securid_data_2 (%s)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
364
"No SecurID passcode in verify_securid_data_2 (%s)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
376
esre2->sam_sad.length, user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
382
securid_user = strdup(user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
386
"while copying user name in verify_securid_data_2 (%s)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
406
"verify_securid_data_2 (%s)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
438
"%s: PIN mismatch", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
455
user, retval);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
478
"PIN2 SAM_CHALLENGE_2 (%s)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
527
"verify_securid_data_2", user, retval);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
560
user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
567
"user %s (SAM2)", user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
610
user);
crypto/krb5/src/plugins/preauth/securid_sam2/securid2.c
661
free(user);
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
1177
KFW_destroy_tickets_for_principal(char * user)
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
1190
code = pkrb5_parse_name(ctx, user, &princ);
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
954
KFW_copy_cache_to_system_file(const char * user, const char * filename)
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
964
if (!pkrb5_init_context || !user || !filename)
crypto/krb5/src/windows/kfwlogon/kfwcommon.c
977
code = pkrb5_parse_name(ctx, user, &princ);
crypto/krb5/src/windows/kfwlogon/kfwlogon.h
204
void KFW_copy_cache_to_system_file(const char * user, const char * filename);
crypto/krb5/src/windows/kfwlogon/kfwlogon.h
205
int KFW_destroy_tickets_for_principal(char * user);
crypto/krb5/src/windows/leashdll/lshutil.cpp
421
void SuggestDefaultRealm(LPTSTR user)
crypto/krb5/src/windows/leashdll/lshutil.cpp
426
int princ_len = _tcslen(user) + _tcslen(m_defaultRealm) + 1;
crypto/krb5/src/windows/leashdll/lshutil.cpp
429
_sntprintf_s(princStr, princ_len, _TRUNCATE, "%s%s", user,
crypto/openssh/audit-bsm.c
269
sel = selected(the_authctxt->user, uid, event_no, rc);
crypto/openssh/audit-bsm.c
317
(void) au_user_mask(the_authctxt->user, &mask);
crypto/openssh/audit-bsm.c
338
what, the_authctxt->user);
crypto/openssh/audit-bsm.c
343
the_authctxt->user);
crypto/openssh/audit-bsm.c
399
const char *user = the_authctxt ? the_authctxt->user : "(unknown user)";
crypto/openssh/audit-bsm.c
409
gettext("successful login %s"), user);
crypto/openssh/audit-bsm.c
420
gettext("sshd logout %s"), the_authctxt->user);
crypto/openssh/audit-bsm.c
435
gettext("too many tries for user %s"), the_authctxt->user);
crypto/openssh/audit.c
75
if (the_authctxt == NULL || the_authctxt->user == NULL)
crypto/openssh/audit.c
79
return (the_authctxt->user);
crypto/openssh/auth-bsdauth.c
75
authctxt->as = auth_userchallenge(authctxt->user,
crypto/openssh/auth-pam.c
1388
authctxt->user);
crypto/openssh/auth-pam.c
1392
authctxt->valid ? authctxt->user : "an illegal user",
crypto/openssh/auth-pam.c
690
const char *pam_user, *user = authctxt->user;
crypto/openssh/auth-pam.c
698
if (strlen(user) >= PAM_MAX_RESP_SIZE)
crypto/openssh/auth-pam.c
712
if (sshpam_err == PAM_SUCCESS && strcmp(user, pam_user) == 0)
crypto/openssh/auth-pam.c
717
debug("PAM: initializing for \"%s\" with service \"%s\"", user,
crypto/openssh/auth-pam.c
719
sshpam_err = pam_start(options.pam_service_name, user,
crypto/openssh/auth-pam.c
944
sshpam_authctxt->user, sshpam_rhost);
crypto/openssh/auth-rhosts.c
128
user = userbuf;
crypto/openssh/auth-rhosts.c
138
if (user[0] == '-') {
crypto/openssh/auth-rhosts.c
140
user++;
crypto/openssh/auth-rhosts.c
141
} else if (user[0] == '+')
crypto/openssh/auth-rhosts.c
142
user++;
crypto/openssh/auth-rhosts.c
145
if (!host[0] || !user[0]) {
crypto/openssh/auth-rhosts.c
161
if (user[0] == '@') {
crypto/openssh/auth-rhosts.c
162
if (!innetgr(user + 1, NULL, client_user, NULL))
crypto/openssh/auth-rhosts.c
164
} else if (strcmp(user, client_user) != 0)
crypto/openssh/auth-rhosts.c
88
char *host, *user, *cp;
crypto/openssh/auth-shadow.c
108
pr = getprpwnam((char *)user);
crypto/openssh/auth-shadow.c
124
logit("User %.100s password has expired (root forced)", user);
crypto/openssh/auth-shadow.c
129
logit("User %.100s password has expired (password aged)", user);
crypto/openssh/auth-shadow.c
91
const char *user = ctxt->pw->pw_name;
crypto/openssh/auth-shadow.c
95
if ((spw = getspnam((char *)user)) == NULL) {
crypto/openssh/auth-shadow.c
96
error("Could not get shadow information for %.100s", user);
crypto/openssh/auth-sia.c
62
if (!authctxt->user || pass == NULL || pass[0] == '\0')
crypto/openssh/auth-sia.c
65
if (sia_ses_init(&ent, saved_argc, saved_argv, host, authctxt->user,
crypto/openssh/auth-sia.c
71
authctxt->user, host);
crypto/openssh/auth.c
306
authctxt->user,
crypto/openssh/auth.c
321
record_failed_login(ssh, authctxt->user,
crypto/openssh/auth.c
331
sys_auth_record_login(authctxt->user,
crypto/openssh/auth.c
346
authctxt->user,
crypto/openssh/auth.c
468
getpwnamallow(struct ssh *ssh, const char *user)
crypto/openssh/auth.c
484
ci->user = user;
crypto/openssh/auth.c
485
ci->user_invalid = getpwnam(user) == NULL;
crypto/openssh/auth.c
494
aix_setauthdb(user);
crypto/openssh/auth.c
497
pw = getpwnam(user);
crypto/openssh/auth.c
505
user, ssh_remote_ipaddr(ssh), ssh_remote_port(ssh));
crypto/openssh/auth.c
507
record_failed_login(ssh, user,
crypto/openssh/auth.c
519
debug("unable to get login class: %s", user);
crypto/openssh/auth.c
540
debug("Approval failure for %s", user);
crypto/openssh/auth.h
193
struct passwd * getpwnamallow(struct ssh *, const char *user);
crypto/openssh/auth.h
64
char *user; /* username sent by the client */
crypto/openssh/auth2-chall.c
197
authctxt->user ? authctxt->user : "<nouser>",
crypto/openssh/auth2-chall.c
200
if (authctxt->user == NULL || !devs)
crypto/openssh/auth2-gss.c
114
if (!authctxt->valid || authctxt->user == NULL) {
crypto/openssh/auth2-gss.c
270
authenticated = mm_ssh_gssapi_userok(authctxt->user);
crypto/openssh/auth2-gss.c
303
ssh_gssapi_buildmic(b, authctxt->user, authctxt->service,
crypto/openssh/auth2-gss.c
311
authenticated = mm_ssh_gssapi_userok(authctxt->user);
crypto/openssh/auth2-hostbased.c
122
if (!authctxt->valid || authctxt->user == NULL) {
crypto/openssh/auth2-hostbased.c
132
(r = sshbuf_put_cstring(b, authctxt->user)) != 0 ||
crypto/openssh/auth2-pubkey.c
137
authctxt->valid ? "valid" : "invalid", authctxt->user,
crypto/openssh/auth2-pubkey.c
204
if (!authctxt->valid || authctxt->user == NULL) {
crypto/openssh/auth2-pubkey.c
209
xasprintf(&userstyle, "%s%s%s", authctxt->user,
crypto/openssh/auth2-pubkey.c
250
authctxt->user, ssh_remote_ipaddr(ssh),
crypto/openssh/auth2-pubkey.c
264
authctxt->user, ssh_remote_ipaddr(ssh),
crypto/openssh/auth2-pubkey.c
278
if (!authctxt->valid || authctxt->user == NULL) {
crypto/openssh/auth2.c
227
user_specific_delay(const char *user)
crypto/openssh/auth2.c
235
(unsigned long long)options.timing_secret, user);
crypto/openssh/auth2.c
273
char *user = NULL, *service = NULL, *method = NULL, *style = NULL;
crypto/openssh/auth2.c
280
if ((r = sshpkt_get_cstring(ssh, &user, NULL)) != 0 ||
crypto/openssh/auth2.c
284
debug("userauth-request for user %s service %s method %s", user, service, method);
crypto/openssh/auth2.c
287
if ((style = strchr(user, ':')) != NULL)
crypto/openssh/auth2.c
294
authctxt->pw = mm_getpwnamallow(ssh, user);
crypto/openssh/auth2.c
295
authctxt->user = xstrdup(user);
crypto/openssh/auth2.c
298
debug2_f("setting up authctxt for %s", user);
crypto/openssh/auth2.c
312
authctxt->valid ? "authenticating " : "invalid ", user);
crypto/openssh/auth2.c
313
setproctitle("%s [net]", authctxt->valid ? user : "unknown");
crypto/openssh/auth2.c
323
} else if (strcmp(user, authctxt->user) != 0 ||
crypto/openssh/auth2.c
327
authctxt->user, authctxt->service, user, service);
crypto/openssh/auth2.c
350
user_specific_delay(authctxt->user));
crypto/openssh/auth2.c
355
free(user);
crypto/openssh/auth2.c
373
authctxt->user);
crypto/openssh/auth2.c
426
"configuration", authctxt->user);
crypto/openssh/auth2.c
441
ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
crypto/openssh/authfd.c
467
if ((r = sshbuf_put_cstring(b, dch->user)) != 0 ||
crypto/openssh/authfd.h
31
char *user; /* wildcards allowed */
crypto/openssh/groupaccess.c
50
ga_init(const char *user, gid_t base)
crypto/openssh/groupaccess.c
65
while (getgrouplist(user, base, groups_bygid, &ngroups) == -1) {
crypto/openssh/gss-genr.c
259
ssh_gssapi_buildmic(struct sshbuf *b, const char *user, const char *service,
crypto/openssh/gss-genr.c
267
(r = sshbuf_put_cstring(b, user)) != 0 ||
crypto/openssh/gss-serv.c
360
ssh_gssapi_userok(char *user)
crypto/openssh/gss-serv.c
370
if ((*gssapi_client.mech->userok)(&gssapi_client, user))
crypto/openssh/match.c
236
match_user(const char *user, const char *host, const char *ipaddr,
crypto/openssh/match.c
243
if (user == NULL && host == NULL && ipaddr == NULL) {
crypto/openssh/match.c
250
if (user == NULL)
crypto/openssh/match.c
254
return match_pattern(user, pattern);
crypto/openssh/match.c
260
if ((ret = match_pattern(user, pat)) == 1)
crypto/openssh/misc.c
1037
char *user = NULL, *host = NULL, *path = NULL;
crypto/openssh/misc.c
1071
if ((user = urldecode(tmp)) == NULL)
crypto/openssh/misc.c
1101
*userp = user;
crypto/openssh/misc.c
1102
user = NULL;
crypto/openssh/misc.c
1117
free(user);
crypto/openssh/misc.c
1202
const char *path = NULL, *user = NULL;
crypto/openssh/misc.c
1223
user = copy;
crypto/openssh/misc.c
1234
if (user != NULL) {
crypto/openssh/misc.c
1235
if ((pw = getpwnam(user)) == NULL) {
crypto/openssh/misc.c
1236
error_f("No such user %s", user);
crypto/openssh/misc.c
840
char *user = NULL, *host = NULL, *path = NULL;
crypto/openssh/misc.c
869
user = xstrdup(sdup);
crypto/openssh/misc.c
872
user = NULL;
crypto/openssh/misc.c
877
*userp = user;
crypto/openssh/misc.c
878
user = NULL;
crypto/openssh/misc.c
891
free(user);
crypto/openssh/misc.c
909
char *user = NULL, *host = NULL;
crypto/openssh/misc.c
926
if ((user = strdup(tmp)) == NULL)
crypto/openssh/misc.c
941
*userp = user;
crypto/openssh/misc.c
942
user = NULL;
crypto/openssh/misc.c
953
free(user);
crypto/openssh/monitor.c
1402
xasprintf(&userstyle, "%s%s%s", authctxt->user,
crypto/openssh/monitor.c
1473
xasprintf(&userstyle, "%s%s%s", authctxt->user,
crypto/openssh/monitor.c
1587
authctxt->user, ssh_remote_ipaddr(ssh),
crypto/openssh/monitor.c
1599
authctxt->user, ssh_remote_ipaddr(ssh),
crypto/openssh/monitor.c
2059
authenticated = authctxt->valid && ssh_gssapi_userok(authctxt->user);
crypto/openssh/monitor.c
377
debug_f("user %s authenticated by privileged process", authctxt->user);
crypto/openssh/monitor.c
380
ssh_packet_set_log_preamble(ssh, "user %s", authctxt->user);
crypto/openssh/monitor.c
851
if ((r = sshbuf_get_cstring(m, &authctxt->user, NULL)) != 0)
crypto/openssh/monitor.c
854
pwent = getpwnamallow(ssh, authctxt->user);
crypto/openssh/monitor.c
856
setproctitle("%s [priv]", pwent ? authctxt->user : "unknown");
crypto/openssh/monitor.c
896
authctxt->valid ? "authenticating" : "invalid ", authctxt->user);
crypto/openssh/monitor.c
902
authctxt->user, ssh_remote_ipaddr(ssh),
crypto/openssh/monitor_wrap.c
1113
mm_ssh_gssapi_userok(char *user)
crypto/openssh/monitor_wrap.c
493
const char *user, const char *host, struct sshkey *key)
crypto/openssh/monitor_wrap.c
495
return (mm_key_allowed(MM_HOSTKEY, user, host, key, 0, NULL));
crypto/openssh/monitor_wrap.c
499
mm_key_allowed(enum mm_keytype type, const char *user, const char *host,
crypto/openssh/monitor_wrap.c
514
(r = sshbuf_put_cstring(m, user ? user : "")) != 0 ||
crypto/openssh/monitor_wrap.h
67
int mm_ssh_gssapi_userok(char *user);
crypto/openssh/openbsd-compat/bsd-misc.c
76
const char *user, const char *domain)
crypto/openssh/openbsd-compat/port-aix.c
132
aix_valid_authentications(const char *user)
crypto/openssh/openbsd-compat/port-aix.c
137
if (getuserattr((char *)user, S_AUTHSYSTEM, &sys, SEC_CHAR) != 0) {
crypto/openssh/openbsd-compat/port-aix.c
139
user, strerror(errno));
crypto/openssh/openbsd-compat/port-aix.c
147
if (getuserattr((char *)user, S_AUTH1, &auth1, SEC_LIST) != 0) {
crypto/openssh/openbsd-compat/port-aix.c
149
user, strerror(errno));
crypto/openssh/openbsd-compat/port-aix.c
159
user, p);
crypto/openssh/openbsd-compat/port-aix.c
283
sys_auth_record_login(const char *user, const char *host, const char *ttynm,
crypto/openssh/openbsd-compat/port-aix.c
289
aix_setauthdb(user);
crypto/openssh/openbsd-compat/port-aix.c
290
if (loginsuccess((char *)user, (char *)host, (char *)ttynm, &msg) == 0) {
crypto/openssh/openbsd-compat/port-aix.c
303
sys_auth_get_lastlogin_msg(const char *user, uid_t uid)
crypto/openssh/openbsd-compat/port-aix.c
316
record_failed_login(struct ssh *ssh, const char *user, const char *hostname,
crypto/openssh/openbsd-compat/port-aix.c
322
aix_setauthdb(user);
crypto/openssh/openbsd-compat/port-aix.c
324
loginfailed((char *)user, (char *)hostname, (char *)ttyname,
crypto/openssh/openbsd-compat/port-aix.c
327
loginfailed((char *)user, (char *)hostname, (char *)ttyname);
crypto/openssh/openbsd-compat/port-aix.c
340
aix_setauthdb(const char *user)
crypto/openssh/openbsd-compat/port-aix.c
350
if (getuserattr((char *)user, S_REGISTRY, ®istry, SEC_CHAR) == 0) {
crypto/openssh/openbsd-compat/port-aix.c
443
getgrouplist(const char *user, gid_t pgid, gid_t *groups, int *grpcnt)
crypto/openssh/openbsd-compat/port-aix.c
452
if ((cp = grplist = getgrset(user)) == NULL)
crypto/openssh/readconf.c
1441
charptr = &options->user;
crypto/openssh/readconf.c
2696
options->user = NULL;
crypto/openssh/readconf.c
3095
free(o->user);
crypto/openssh/readconf.c
3373
char *host = NULL, *user = NULL;
crypto/openssh/readconf.c
3396
r = parse_ssh_uri(cp, &user, &host, &port);
crypto/openssh/readconf.c
3398
parse_user_host_port(cp, &user, &host, &port) != 0))
crypto/openssh/readconf.c
3415
o->jump_user = user;
crypto/openssh/readconf.c
3419
user = host = NULL;
crypto/openssh/readconf.c
3429
free(user);
crypto/openssh/readconf.c
3437
char *user = NULL, *host = NULL, *path = NULL;
crypto/openssh/readconf.c
3440
r = parse_uri("ssh", uri, &user, &host, &port, &path);
crypto/openssh/readconf.c
3445
*userp = user;
crypto/openssh/readconf.c
3446
user = NULL;
crypto/openssh/readconf.c
3455
free(user);
crypto/openssh/readconf.c
358
const char *user, const char *jumphost)
crypto/openssh/readconf.c
3638
dump_cfg_string(oUser, o->user);
crypto/openssh/readconf.c
367
ssh_digest_update(md, user, strlen(user)) < 0 ||
crypto/openssh/readconf.c
666
ruser = options->user == NULL ? pw->pw_name : options->user;
crypto/openssh/readconf.c
725
ruser = options->user == NULL ? pw->pw_name : options->user;
crypto/openssh/readconf.h
237
const char *portstr, const char *user, const char *jump_host);
crypto/openssh/readconf.h
75
char *user; /* User to log in as. */
crypto/openssh/regress/unittests/misc/test_parse.c
29
char *user, *host, *path;
crypto/openssh/regress/unittests/misc/test_parse.c
33
&user, &host, &path), 0);
crypto/openssh/regress/unittests/misc/test_parse.c
34
ASSERT_STRING_EQ(user, "someuser");
crypto/openssh/regress/unittests/misc/test_parse.c
37
free(user); free(host); free(path);
crypto/openssh/regress/unittests/misc/test_parse.c
42
&user, &host, &path), 0);
crypto/openssh/regress/unittests/misc/test_parse.c
43
ASSERT_STRING_EQ(user, "someuser");
crypto/openssh/regress/unittests/misc/test_parse.c
46
free(user); free(host); free(path);
crypto/openssh/regress/unittests/misc/test_parse.c
51
&user, &host, &path), 0);
crypto/openssh/regress/unittests/misc/test_parse.c
52
ASSERT_STRING_EQ(user, "someuser");
crypto/openssh/regress/unittests/misc/test_parse.c
55
free(user); free(host); free(path);
crypto/openssh/regress/unittests/misc/test_parse.c
60
&user, &host, &path), 0);
crypto/openssh/regress/unittests/misc/test_parse.c
61
ASSERT_STRING_EQ(user, "someuser");
crypto/openssh/regress/unittests/misc/test_parse.c
64
free(user); free(host); free(path);
crypto/openssh/regress/unittests/misc/test_parse.c
69
&user, &host, &path), 0);
crypto/openssh/regress/unittests/misc/test_parse.c
70
ASSERT_STRING_EQ(user, "someuser");
crypto/openssh/regress/unittests/misc/test_parse.c
73
free(user); free(host); free(path);
crypto/openssh/regress/unittests/misc/test_parse.c
78
&user, &host, &port, &path), 0);
crypto/openssh/regress/unittests/misc/test_parse.c
79
ASSERT_STRING_EQ(user, "someuser");
crypto/openssh/regress/unittests/misc/test_parse.c
83
free(user); free(host); free(path);
crypto/openssh/scp.c
1019
do_sftp_connect(char *host, char *user, int port, char *sftp_direct,
crypto/openssh/scp.c
1023
if (do_cmd(ssh_program, host, user, port, 1, "sftp",
crypto/openssh/servconf.c
1010
match_cfg_line_group(const char *grps, int line, const char *user)
crypto/openssh/servconf.c
1015
if (user == NULL)
crypto/openssh/servconf.c
1018
if ((pw = getpwnam(user)) == NULL) {
crypto/openssh/servconf.c
1020
"not exist", line, user);
crypto/openssh/servconf.c
1023
"at line %d", user, line);
crypto/openssh/servconf.c
1026
user, grps, line);
crypto/openssh/servconf.c
1028
debug("user %.100s matched group list %.100s at line %d", user,
crypto/openssh/servconf.c
1062
ci->user ? ci->user : "(null)",
crypto/openssh/servconf.c
1128
if (ci == NULL || (ci->test && ci->user == NULL)) {
crypto/openssh/servconf.c
1132
if (ci->user == NULL)
crypto/openssh/servconf.c
1134
if (match_usergroup_pattern_list(ci->user, arg) != 1)
crypto/openssh/servconf.c
1138
"line %d", ci->user, arg, line);
crypto/openssh/servconf.c
1140
if (ci == NULL || (ci->test && ci->user == NULL)) {
crypto/openssh/servconf.c
1144
if (ci->user == NULL)
crypto/openssh/servconf.c
1146
switch (match_cfg_line_group(arg, line, ci->user)) {
crypto/openssh/servconf.c
2853
ci->user = xstrdup(val);
crypto/openssh/servconf.h
261
const char *user;
crypto/openssh/sftp-common.c
218
const char *user, const char *group)
crypto/openssh/sftp-common.c
228
if (user == NULL) {
crypto/openssh/sftp-common.c
230
user = ubuf;
crypto/openssh/sftp-common.c
238
user = user_from_uid(st->st_uid, 0);
crypto/openssh/sftp-common.c
252
ulen = MAXIMUM(strlen(user), 8);
crypto/openssh/sftp-common.c
257
mode, lc, ulen, user, glen, group,
crypto/openssh/sftp-common.c
261
mode, lc, ulen, user, glen, group,
crypto/openssh/sftp-usergroup.c
151
collect_ids_from_glob(glob_t *g, int user, u_int **idsp, u_int *nidsp)
crypto/openssh/sftp-usergroup.c
156
if (user) {
crypto/openssh/sftp-usergroup.c
190
collect_ids_from_dirents(SFTP_DIRENT **d, int user, u_int **idsp, u_int *nidsp)
crypto/openssh/sftp-usergroup.c
195
if (user) {
crypto/openssh/sftp.c
2441
char *host = NULL, *user, *cp, **cpp, *file2 = NULL;
crypto/openssh/sftp.c
2616
switch (parse_uri("sftp", *argv, &user, &host, &tmp, &file1)) {
crypto/openssh/sftp.c
2626
if (parse_user_host_path(*argv, &user, &host,
crypto/openssh/sftp.c
2630
if (parse_user_host_port(*argv, &user, &host, NULL)
crypto/openssh/sftp.c
2647
if (user != NULL) {
crypto/openssh/sftp.c
2649
addargs(&args, "%s", user);
crypto/openssh/ssh-add.c
693
char *user = NULL, *host, *os, *path;
crypto/openssh/ssh-add.c
705
user = os;
crypto/openssh/ssh-add.c
710
if (user == NULL) {
crypto/openssh/ssh-add.c
714
dch->user = xstrdup(user);
crypto/openssh/ssh-add.c
729
dch->user = user == NULL ? NULL : xstrdup(user);
crypto/openssh/ssh-add.c
737
user == NULL ? "": user, user == NULL ? "" : "@",
crypto/openssh/ssh-add.c
774
if (dc->from.user != NULL) {
crypto/openssh/ssh-add.c
781
dc->from.user ? dc->from.user : "", dc->from.user ? "@" : "",
crypto/openssh/ssh-add.c
783
dc->to.user ? dc->to.user : "", dc->to.user ? "@" : "",
crypto/openssh/ssh-agent.c
1009
free(user);
crypto/openssh/ssh-agent.c
1109
if ((r = sshbuf_get_cstring(b, &dch->user, NULL)) != 0 ||
crypto/openssh/ssh-agent.c
1124
if (*dch->user == '\0') {
crypto/openssh/ssh-agent.c
1125
free(dch->user);
crypto/openssh/ssh-agent.c
1126
dch->user = NULL;
crypto/openssh/ssh-agent.c
1140
dch->user == NULL ? "" : dch->user,
crypto/openssh/ssh-agent.c
1141
dch->user == NULL ? "" : "@",
crypto/openssh/ssh-agent.c
1183
dc->to.user ? dc->to.user : "", dc->to.user ? "@" : "",
crypto/openssh/ssh-agent.c
1187
dc->from.user != NULL) {
crypto/openssh/ssh-agent.c
258
free(dch->user);
crypto/openssh/ssh-agent.c
286
out->user = dch->user == NULL ? NULL : xstrdup(dch->user);
crypto/openssh/ssh-agent.c
328
dch->user == NULL ? "(null)" : dch->user,
crypto/openssh/ssh-agent.c
437
const struct sshkey *tokey, Identity *id, const char *user,
crypto/openssh/ssh-agent.c
449
i, d->from.user ? d->from.user : "",
crypto/openssh/ssh-agent.c
450
d->from.user ? "@" : "",
crypto/openssh/ssh-agent.c
453
d->to.user ? d->to.user : "", d->to.user ? "@" : "",
crypto/openssh/ssh-agent.c
469
if (d->to.user != NULL && user != NULL &&
crypto/openssh/ssh-agent.c
470
!match_pattern(user, d->to.user))
crypto/openssh/ssh-agent.c
492
identity_permitted(Identity *id, SocketEntry *e, char *user,
crypto/openssh/ssh-agent.c
535
fromkey ? fp1 : "", user ? user : "(ANY)",
crypto/openssh/ssh-agent.c
552
test_user = user;
crypto/openssh/ssh-agent.c
558
if (hks->forwarded && user != NULL) {
crypto/openssh/ssh-agent.c
580
if (hks->forwarded && user == NULL &&
crypto/openssh/ssh-agent.c
715
char *user = NULL, *service = NULL, *method = NULL, *pkalg = NULL;
crypto/openssh/ssh-agent.c
737
(r = sshbuf_get_cstring(b, &user, NULL)) != 0 || /* server user */
crypto/openssh/ssh-agent.c
767
*userp = user;
crypto/openssh/ssh-agent.c
768
user = NULL;
crypto/openssh/ssh-agent.c
781
free(user);
crypto/openssh/ssh-agent.c
867
char *user = NULL, *sig_dest = NULL;
crypto/openssh/ssh-agent.c
899
if (parse_userauth_request(data, key, &user, &sid,
crypto/openssh/ssh-agent.c
906
debug_f("user=%s", user);
crypto/openssh/ssh-agent.c
907
if (identity_permitted(id, e, user, &fwd_host, &dest_host) != 0)
crypto/openssh/ssh-agent.c
919
"key %s %s", e->nsession_ids, user,
crypto/openssh/ssh-agent.c
942
"user \"%s\" to listed host", user);
crypto/openssh/ssh-keygen.c
3162
sk_suffix(const char *application, const uint8_t *user, size_t userlen)
crypto/openssh/ssh-keygen.c
3177
if (user[userlen - i - 1] != 0)
crypto/openssh/ssh-keygen.c
3185
if (asmprintf(&cp, INT_MAX, NULL, "%.*s", (int)slen, user) == -1)
crypto/openssh/ssh-keygen.c
3191
cp = tohex(user, slen);
crypto/openssh/ssh-keygen.c
3310
confirm_sk_overwrite(const char *application, const char *user)
crypto/openssh/ssh-keygen.c
3316
user == NULL ? "null" : user);
crypto/openssh/ssh-pkcs11.c
1542
struct pkcs11_provider **providerp, CK_ULONG user)
crypto/openssh/ssh-pkcs11.c
1651
if ((ret = pkcs11_open_session(p, i, pin, user)) != 0 ||
crypto/openssh/ssh-pkcs11.c
653
CK_ULONG user)
crypto/openssh/ssh-pkcs11.c
678
rv = f->C_Login(session, user, (u_char *)pin, strlen(pin));
crypto/openssh/ssh.c
1027
if (options.user == NULL)
crypto/openssh/ssh.c
1028
options.user = xstrdup(optarg);
crypto/openssh/ssh.c
1128
if (options.user == NULL) {
crypto/openssh/ssh.c
1129
options.user = tuser;
crypto/openssh/ssh.c
1142
if (options.user == NULL) {
crypto/openssh/ssh.c
1143
options.user = p;
crypto/openssh/ssh.c
1304
if (options.user == NULL)
crypto/openssh/ssh.c
1305
options.user = xstrdup(pw->pw_name);
crypto/openssh/ssh.c
1320
jumpuser = options.user;
crypto/openssh/ssh.c
1322
strcmp(options.user, jumpuser) == 0)
crypto/openssh/ssh.c
1455
if (options.user != NULL) {
crypto/openssh/ssh.c
1456
if ((p = percent_dollar_expand(options.user,
crypto/openssh/ssh.c
1460
free(options.user);
crypto/openssh/ssh.c
1461
options.user = p;
crypto/openssh/ssh.c
1462
if (!valid_ruser(options.user))
crypto/openssh/ssh.c
1467
cinfo->remuser = xstrdup(options.user);
crypto/openssh/sshconnect.c
103
"r", options.user,
crypto/openssh/sshconnect.c
129
command_string = expand_proxy_command(proxy_command, options.user,
crypto/openssh/sshconnect.c
1609
server_user = options.user ? options.user : local_user;
crypto/openssh/sshconnect.c
212
command_string = expand_proxy_command(proxy_command, options.user,
crypto/openssh/sshconnect.c
89
expand_proxy_command(const char *proxy_command, const char *user,
crypto/openssh/sshlogin.c
105
time_string = sys_auth_get_lastlogin_msg(user, uid);
crypto/openssh/sshlogin.c
113
last_login_time = get_last_login_time(uid, user, hostname,
crypto/openssh/sshlogin.c
137
record_login(pid_t pid, const char *tty, const char *user, uid_t uid,
crypto/openssh/sshlogin.c
143
store_lastlog_message(user, uid);
crypto/openssh/sshlogin.c
145
li = login_alloc_entry(pid, user, host, tty);
crypto/openssh/sshlogin.c
153
record_utmp_only(pid_t pid, const char *ttyname, const char *user,
crypto/openssh/sshlogin.c
158
li = login_alloc_entry(pid, user, host, ttyname);
crypto/openssh/sshlogin.c
167
record_logout(pid_t pid, const char *tty, const char *user)
crypto/openssh/sshlogin.c
171
li = login_alloc_entry(pid, user, NULL, tty);
crypto/openssh/sshlogin.c
91
store_lastlog_message(const char *user, uid_t uid)
crypto/openssl/apps/include/s_apps.h
108
SRP_user_pwd *user;
crypto/openssl/apps/lib/tlssrp_depr.c
158
if (p->login == NULL && p->user == NULL) {
crypto/openssl/apps/lib/tlssrp_depr.c
164
if (p->user == NULL) {
crypto/openssl/apps/lib/tlssrp_depr.c
169
if (SSL_set_srp_server_param(s, p->user->N, p->user->g, p->user->s, p->user->v,
crypto/openssl/apps/lib/tlssrp_depr.c
170
p->user->info)
crypto/openssl/apps/lib/tlssrp_depr.c
177
p->login, p->user->info);
crypto/openssl/apps/lib/tlssrp_depr.c
181
SRP_user_pwd_free(p->user);
crypto/openssl/apps/lib/tlssrp_depr.c
182
p->user = NULL;
crypto/openssl/apps/lib/tlssrp_depr.c
193
srp_callback_parm->user = NULL;
crypto/openssl/apps/lib/tlssrp_depr.c
217
SRP_user_pwd_free(srp_callback_parm->user);
crypto/openssl/apps/lib/tlssrp_depr.c
218
srp_callback_parm->user = SRP_VBASE_get1_by_user(srp_callback_parm->vb,
crypto/openssl/apps/lib/tlssrp_depr.c
221
if (srp_callback_parm->user != NULL)
crypto/openssl/apps/lib/tlssrp_depr.c
223
srp_callback_parm->user->info);
crypto/openssl/apps/srp.c
120
static char *srp_verify_user(const char *user, const char *srp_verifier,
crypto/openssl/apps/srp.c
130
cb_tmp.prompt_info = user;
crypto/openssl/apps/srp.c
139
user, srp_verifier, srp_usersalt, g, N);
crypto/openssl/apps/srp.c
144
if ((gNid = SRP_create_verifier(user, password, &srp_usersalt,
crypto/openssl/apps/srp.c
158
static char *srp_create_user(char *user, char **srp_verifier,
crypto/openssl/apps/srp.c
167
cb_tmp.prompt_info = user;
crypto/openssl/apps/srp.c
175
user, g, N);
crypto/openssl/apps/srp.c
176
if ((gNid = SRP_create_verifier(user, password, &salt,
crypto/openssl/apps/srp.c
250
char *user = NULL, *passinarg = NULL, *passoutarg = NULL;
crypto/openssl/apps/srp.c
341
user = *argv++;
crypto/openssl/apps/srp.c
429
while (mode == OPT_LIST || user != NULL) {
crypto/openssl/apps/srp.c
432
if (user != NULL && verbose > 1)
crypto/openssl/apps/srp.c
433
BIO_printf(bio_err, "Processing user \"%s\"\n", user);
crypto/openssl/apps/srp.c
434
if ((userindex = get_index(db, user, 'U')) >= 0)
crypto/openssl/apps/srp.c
438
if (user == NULL) {
crypto/openssl/apps/srp.c
445
"user \"%s\" does not exist, ignored. t\n", user);
crypto/openssl/apps/srp.c
452
BIO_printf(bio_err, "user \"%s\" reactivated.\n", user);
crypto/openssl/apps/srp.c
462
if (!(gNid = srp_create_user(user, &(row[DB_srpverifier]),
crypto/openssl/apps/srp.c
469
user);
crypto/openssl/apps/srp.c
473
row[DB_srpid] = OPENSSL_strdup(user);
crypto/openssl/apps/srp.c
499
user);
crypto/openssl/apps/srp.c
508
user);
crypto/openssl/apps/srp.c
519
user);
crypto/openssl/apps/srp.c
524
if (!srp_verify_user(user, row[DB_srpverifier], row[DB_srpsalt],
crypto/openssl/apps/srp.c
530
user);
crypto/openssl/apps/srp.c
537
user);
crypto/openssl/apps/srp.c
539
if (!(gNid = srp_create_user(user, &(row[DB_srpverifier]),
crypto/openssl/apps/srp.c
546
user);
crypto/openssl/apps/srp.c
571
user);
crypto/openssl/apps/srp.c
576
BIO_printf(bio_err, "user \"%s\" revoked. t\n", user);
crypto/openssl/apps/srp.c
581
user = *argv++;
crypto/openssl/apps/srp.c
582
if (user == NULL) {
crypto/openssl/crypto/http/http_lib.c
165
|| !copy_substring(puser, user, user_end)
crypto/openssl/crypto/http/http_lib.c
60
const char *user, *user_end;
crypto/openssl/crypto/http/http_lib.c
95
user = user_end = host = p;
crypto/openssl/crypto/srp/srp_lib.c
142
BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass,
crypto/openssl/crypto/srp/srp_lib.c
151
if ((s == NULL) || (user == NULL) || (pass == NULL))
crypto/openssl/crypto/srp/srp_lib.c
165
|| !EVP_DigestUpdate(ctxt, user, strlen(user))
crypto/openssl/crypto/srp/srp_lib.c
189
BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass)
crypto/openssl/crypto/srp/srp_lib.c
191
return SRP_Calc_x_ex(s, user, pass, NULL, NULL);
crypto/openssl/crypto/srp/srp_vfy.c
515
SRP_user_pwd *user;
crypto/openssl/crypto/srp/srp_vfy.c
521
user = sk_SRP_user_pwd_value(vb->users_pwd, i);
crypto/openssl/crypto/srp/srp_vfy.c
522
if (strcmp(user->id, username) == 0)
crypto/openssl/crypto/srp/srp_vfy.c
523
return user;
crypto/openssl/crypto/srp/srp_vfy.c
555
SRP_user_pwd *user;
crypto/openssl/crypto/srp/srp_vfy.c
564
if ((user = find_user(vb, username)) != NULL)
crypto/openssl/crypto/srp/srp_vfy.c
565
return srp_user_pwd_dup(user);
crypto/openssl/crypto/srp/srp_vfy.c
572
if ((user = SRP_user_pwd_new()) == NULL)
crypto/openssl/crypto/srp/srp_vfy.c
575
SRP_user_pwd_set_gN(user, vb->default_g, vb->default_N);
crypto/openssl/crypto/srp/srp_vfy.c
577
if (!SRP_user_pwd_set1_ids(user, username, NULL))
crypto/openssl/crypto/srp/srp_vfy.c
596
if (SRP_user_pwd_set0_sv(user,
crypto/openssl/crypto/srp/srp_vfy.c
599
return user;
crypto/openssl/crypto/srp/srp_vfy.c
604
SRP_user_pwd_free(user);
crypto/openssl/crypto/srp/srp_vfy.c
611
char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt,
crypto/openssl/crypto/srp/srp_vfy.c
624
if ((user == NULL) || (pass == NULL) || (salt == NULL) || (verifier == NULL))
crypto/openssl/crypto/srp/srp_vfy.c
663
if (!SRP_create_verifier_BN_ex(user, pass, &s, &v, N_bn, g_bn, libctx,
crypto/openssl/crypto/srp/srp_vfy.c
701
char *SRP_create_verifier(const char *user, const char *pass, char **salt,
crypto/openssl/crypto/srp/srp_vfy.c
704
return SRP_create_verifier_ex(user, pass, salt, verifier, N, g, NULL, NULL);
crypto/openssl/crypto/srp/srp_vfy.c
716
int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt,
crypto/openssl/crypto/srp/srp_vfy.c
727
if ((user == NULL) || (pass == NULL) || (salt == NULL) || (verifier == NULL) || (N == NULL) || (g == NULL) || (bn_ctx == NULL))
crypto/openssl/crypto/srp/srp_vfy.c
741
x = SRP_Calc_x_ex(salttmp, user, pass, libctx, propq);
crypto/openssl/crypto/srp/srp_vfy.c
766
int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt,
crypto/openssl/crypto/srp/srp_vfy.c
770
return SRP_create_verifier_BN_ex(user, pass, salt, verifier, N, g, NULL,
crypto/openssl/crypto/x509/v3_sxnet.c
120
int SXNET_add_id_asc(SXNET **psx, const char *zone, const char *user, int userlen)
crypto/openssl/crypto/x509/v3_sxnet.c
128
if (!SXNET_add_id_INTEGER(psx, izone, user, userlen)) {
crypto/openssl/crypto/x509/v3_sxnet.c
137
int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, const char *user,
crypto/openssl/crypto/x509/v3_sxnet.c
148
if (!SXNET_add_id_INTEGER(psx, izone, user, userlen)) {
crypto/openssl/crypto/x509/v3_sxnet.c
160
int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *zone, const char *user,
crypto/openssl/crypto/x509/v3_sxnet.c
166
if (psx == NULL || zone == NULL || user == NULL) {
crypto/openssl/crypto/x509/v3_sxnet.c
171
userlen = strlen(user);
crypto/openssl/crypto/x509/v3_sxnet.c
199
if (!ASN1_OCTET_STRING_set(id->user, (const unsigned char *)user, userlen)) {
crypto/openssl/crypto/x509/v3_sxnet.c
256
return id->user;
crypto/openssl/crypto/x509/v3_sxnet.c
45
ASN1_SIMPLE(SXNETID, user, ASN1_OCTET_STRING)
crypto/openssl/crypto/x509/v3_sxnet.c
85
ASN1_STRING_print(out, id->user);
crypto/openssl/include/openssl/srp.h
196
char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt,
crypto/openssl/include/openssl/srp.h
200
char *SRP_create_verifier(const char *user, const char *pass, char **salt,
crypto/openssl/include/openssl/srp.h
203
int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt,
crypto/openssl/include/openssl/srp.h
208
int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt,
crypto/openssl/include/openssl/srp.h
260
BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass,
crypto/openssl/include/openssl/srp.h
263
BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass);
crypto/openssl/include/openssl/ssl.h
1941
int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass,
crypto/openssl/include/openssl/x509v3.h
379
ASN1_OCTET_STRING *user;
crypto/openssl/include/openssl/x509v3.h
811
int SXNET_add_id_asc(SXNET **psx, const char *zone, const char *user, int userlen);
crypto/openssl/include/openssl/x509v3.h
812
int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, const char *user,
crypto/openssl/include/openssl/x509v3.h
814
int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *izone, const char *user,
crypto/openssl/ssl/tls_srp.c
218
int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass,
crypto/openssl/ssl/tls_srp.c
236
if (!SRP_create_verifier_BN_ex(user, pass, &sc->srp_ctx.s, &sc->srp_ctx.v,
crypto/openssl/test/http_test.c
292
char *user, *host, *port, *path, *query, *frag;
crypto/openssl/test/http_test.c
298
res = TEST_true(OSSL_HTTP_parse_url(url, &ssl, &user, &host, &port, &num,
crypto/openssl/test/http_test.c
305
if (res && *user != '\0')
crypto/openssl/test/http_test.c
306
res = TEST_str_eq(user, "user:pass");
crypto/openssl/test/http_test.c
311
OPENSSL_free(user);
crypto/openssl/test/sslapitest.c
7537
SRP_user_pwd *user = NULL;
crypto/openssl/test/sslapitest.c
7545
user = SRP_VBASE_get1_by_user(vbase, username);
crypto/openssl/test/sslapitest.c
7546
if (user == NULL) {
crypto/openssl/test/sslapitest.c
7551
if (SSL_set_srp_server_param(s, user->N, user->g, user->s, user->v,
crypto/openssl/test/sslapitest.c
7552
user->info)
crypto/openssl/test/sslapitest.c
7561
SRP_user_pwd_free(user);
lib/libc/db/test/btree.tests/main.c
177
user(db);
lib/libc/db/test/btree.tests/main.c
79
void user(DB *);
lib/libc/gen/getnetgrent.c
1010
netgroup, host, user, domain);
lib/libc/gen/getnetgrent.c
534
const char *group, *host, *user, *dom;
lib/libc/gen/getnetgrent.c
538
user = va_arg(ap, const char *);
lib/libc/gen/getnetgrent.c
572
if (_use_only_yp && (host == NULL) != (user == NULL)) {
lib/libc/gen/getnetgrent.c
578
host?host:user, dom, group);
lib/libc/gen/getnetgrent.c
589
return (_innetgr_fallback(retval, mdata, group, host, user, dom));
lib/libc/gen/getnetgrent.c
594
const char *user, const char *dom)
lib/libc/gen/getnetgrent.c
639
(user == NULL || u == NULL || strcmp(user, u) == 0) &&
lib/libc/gen/getnetgrent.c
656
const char *group, *host, *user, *dom;
lib/libc/gen/getnetgrent.c
660
user = va_arg(ap, const char *);
lib/libc/gen/getnetgrent.c
663
return (_innetgr_fallback(retval, mdata, group, host, user, dom));
lib/libc/gen/getnetgrent.c
999
innetgr(const char *netgroup, const char *host, const char *user,
lib/libc/gen/getpwent.c
1739
char *host, *user, *domain;
lib/libc/gen/getpwent.c
1802
rv = getnetgrent(&host, &user, &domain);
lib/libc/gen/getpwent.c
1808
} else if (user == NULL || user[0] == '\0')
lib/libc/gen/getpwent.c
1811
user, uid, pwd, buffer, bufsize, errnop);
lib/libc/gen/getpwent.c
1897
while (getnetgrent(&host, &user, &domain) !=
lib/libc/gen/getpwent.c
1899
if (user != NULL && user[0] != '\0')
lib/libc/gen/getpwent.c
1900
compat_exclude(user,
lib/libc/gen/getutxent.c
222
getutxuser(const char *user)
lib/libc/gen/getutxent.c
232
if (strncmp(fu.fu_user, user, sizeof(fu.fu_user)) == 0)
lib/libc/gen/utxdb.c
146
FTOU_STRING(fu, ut, user);
lib/libc/gen/utxdb.c
158
FTOU_STRING(fu, ut, user);
lib/libc/gen/utxdb.c
75
UTOF_STRING(ut, fu, user);
lib/libc/gen/utxdb.c
87
UTOF_STRING(ut, fu, user);
lib/libc/gmon/mcount.c
103
frompci = (uintfptr_t)user - p->lowpc;
lib/libc/gmon/mcount.c
42
void user(void);
lib/libc/net/rcmd.c
563
char *user, *p;
lib/libc/net/rcmd.c
601
user = p;
lib/libc/net/rcmd.c
606
user = p;
lib/libc/net/rcmd.c
640
switch(*user) {
lib/libc/net/rcmd.c
642
if (!*(user+1)) { /* '+' matches all users */
lib/libc/net/rcmd.c
646
if (*(user+1) == '@') /* match a user by netgroup */
lib/libc/net/rcmd.c
647
userok = innetgr(user+2, NULL, ruser, ypdomain);
lib/libc/net/rcmd.c
649
userok = !(strcmp(ruser, user+1));
lib/libc/net/rcmd.c
653
if (!*(user+1))
lib/libc/net/rcmd.c
655
if (*(user+1) == '@') {
lib/libc/net/rcmd.c
656
if (innetgr(user+2, NULL,
lib/libc/net/rcmd.c
660
if (!strcmp(ruser, user+1))
lib/libc/net/rcmd.c
667
userok = !(strcmp(ruser,*user ? user : luser));
lib/libfetch/common.c
1695
if (snprintf(url->user, sizeof(url->user),
lib/libfetch/common.c
1696
"%s", word) > (int)sizeof(url->user)) {
lib/libfetch/common.c
1698
url->user[0] = '\0';
lib/libfetch/fetch.c
255
const char *user, const char *pwd)
lib/libfetch/fetch.c
285
seturl(user);
lib/libfetch/fetch.c
385
q = fetch_pctdecode(u->user, URL, URL_USERLEN);
lib/libfetch/fetch.c
475
u->scheme, u->user, u->pwd,
lib/libfetch/fetch.h
42
char user[URL_USERLEN+1];
lib/libfetch/ftp.c
1030
&& (strcmp(url->user, cached_host.user) == 0)
lib/libfetch/ftp.c
907
const char *user, *pwd, *logname;
lib/libfetch/ftp.c
914
if (url->user[0] == '\0')
lib/libfetch/ftp.c
916
user = url->user;
lib/libfetch/ftp.c
917
if (*user == '\0')
lib/libfetch/ftp.c
918
if ((user = getenv("FTP_LOGIN")) != NULL)
lib/libfetch/ftp.c
919
DEBUGF("FTP_LOGIN=%s\n", user);
lib/libfetch/ftp.c
920
if (user == NULL || *user == '\0')
lib/libfetch/ftp.c
921
user = FTP_ANONYMOUS_USER;
lib/libfetch/ftp.c
923
e = ftp_cmd(conn, "USER %s@%s", user, url->host);
lib/libfetch/ftp.c
925
e = ftp_cmd(conn, "USER %s@%s@%d", user, url->host, url->port);
lib/libfetch/ftp.c
927
e = ftp_cmd(conn, "USER %s", user);
lib/libfetch/http.c
1026
char *user;
lib/libfetch/http.c
1033
s->scheme = s->realm = s->user = s->password = NULL;
lib/libfetch/http.c
1043
if (s->user)
lib/libfetch/http.c
1044
free(s->user);
lib/libfetch/http.c
1087
if ((parms->user = strdup(v)) == NULL) {
lib/libfetch/http.c
1279
DigestCalcHA1(c->algo, parms->user, c->realm,
lib/libfetch/http.c
1291
hdr, parms->user, c->realm,
lib/libfetch/http.c
1297
hdr, parms->user, c->realm,
lib/libfetch/http.c
1339
if (!parms->user || !parms->password) {
lib/libfetch/http.c
1363
return (http_basic_auth(conn,hdr,parms->user,parms->password));
lib/libfetch/http.c
1418
if (*purl->user || *purl->pwd) {
lib/libfetch/http.c
1419
aparams.user = strdup(purl->user);
lib/libfetch/http.c
1429
aparams.user = strdup(purl->user);
lib/libfetch/http.c
1689
if (*purl->user || *purl->pwd) {
lib/libfetch/http.c
1690
aparams.user = strdup(purl->user);
lib/libfetch/http.c
1699
aparams.user = strdup(purl->user);
lib/libfetch/http.c
1719
if (*url->user || *url->pwd) {
lib/libfetch/http.c
1720
aparams.user = strdup(url->user);
lib/libfetch/http.c
1729
aparams.user = strdup(url->user);
lib/libfetch/http.c
1733
aparams.user = strdup(url->user);
lib/libfetch/http.c
1904
url->port, p, url->user, url->pwd);
lib/libfetch/http.c
1915
!*new->user && !*new->pwd) {
lib/libfetch/http.c
1916
strcpy(new->user, url->user);
lib/libpam/modules/pam_chroot/pam_chroot.c
54
const char *dir, *end, *cwd, *user;
lib/libpam/modules/pam_chroot/pam_chroot.c
58
if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
lib/libpam/modules/pam_chroot/pam_chroot.c
59
user == NULL || (pwd = getpwnam(user)) == NULL)
lib/libpam/modules/pam_chroot/pam_chroot.c
69
"%s's home directory is too long", user);
lib/libpam/modules/pam_chroot/pam_chroot.c
80
"%s has no chroot directory", user);
lib/libpam/modules/pam_chroot/pam_chroot.c
86
openpam_log(PAM_LOG_DEBUG, "chrooting %s to %s", dir, user);
lib/libpam/modules/pam_deny/pam_deny.c
44
const char *user;
lib/libpam/modules/pam_deny/pam_deny.c
47
if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
lib/libpam/modules/pam_ftpusers/pam_ftpusers.c
101
if (strcmp(user, *mem) == 0)
lib/libpam/modules/pam_ftpusers/pam_ftpusers.c
59
const char *user;
lib/libpam/modules/pam_ftpusers/pam_ftpusers.c
65
pam_err = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_ftpusers/pam_ftpusers.c
68
if (user == NULL || (pwd = getpwnam(user)) == NULL)
lib/libpam/modules/pam_ftpusers/pam_ftpusers.c
72
ulen = strlen(user);
lib/libpam/modules/pam_ftpusers/pam_ftpusers.c
86
if (len == ulen && strncmp(user, line, len) == 0)
lib/libpam/modules/pam_group/pam_group.c
59
const char *group, *user;
lib/libpam/modules/pam_group/pam_group.c
66
if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS ||
lib/libpam/modules/pam_group/pam_group.c
67
user == NULL || (pwd = getpwnam(user)) == NULL)
lib/libpam/modules/pam_guest/pam_guest.c
100
pam_setenv(pamh, "GUEST", user, 1);
lib/libpam/modules/pam_guest/pam_guest.c
72
const char *authtok, *guests, *user;
lib/libpam/modules/pam_guest/pam_guest.c
76
if (pam_get_user(pamh, &user, NULL) != PAM_SUCCESS || user == NULL)
lib/libpam/modules/pam_guest/pam_guest.c
84
is_guest = lookup(user, guests);
lib/libpam/modules/pam_guest/pam_guest.c
92
strcmp(user, authtok) != 0)
lib/libpam/modules/pam_krb5/pam_krb5.c
130
const char *user, *pass;
lib/libpam/modules/pam_krb5/pam_krb5.c
134
retval = pam_get_user(pamh, &user, USER_PROMPT);
lib/libpam/modules/pam_krb5/pam_krb5.c
138
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_krb5/pam_krb5.c
195
asprintf(&principal, "%s/%s", (const char *)sourceuser, user);
lib/libpam/modules/pam_krb5/pam_krb5.c
197
principal = strdup(user);
lib/libpam/modules/pam_krb5/pam_krb5.c
237
if (strchr(user, '@')) {
lib/libpam/modules/pam_krb5/pam_krb5.c
257
pwd = getpwnam(user);
lib/libpam/modules/pam_krb5/pam_krb5.c
419
const void *user;
lib/libpam/modules/pam_krb5/pam_krb5.c
446
retval = pam_get_item(pamh, PAM_USER, &user);
lib/libpam/modules/pam_krb5/pam_krb5.c
450
PAM_LOG("Got user: %s", (const char *)user);
lib/libpam/modules/pam_krb5/pam_krb5.c
480
pwd = getpwnam(user);
lib/libpam/modules/pam_krb5/pam_krb5.c
660
const void *user;
lib/libpam/modules/pam_krb5/pam_krb5.c
663
retval = pam_get_item(pamh, PAM_USER, &user);
lib/libpam/modules/pam_krb5/pam_krb5.c
667
PAM_LOG("Got user: %s", (const char *)user);
lib/libpam/modules/pam_krb5/pam_krb5.c
704
if (krb5_kuserok(krbctx, princ, (const char *)user))
lib/libpam/modules/pam_krb5/pam_krb5.c
735
const void *user;
lib/libpam/modules/pam_krb5/pam_krb5.c
741
retval = pam_get_item(pamh, PAM_USER, &user);
lib/libpam/modules/pam_krb5/pam_krb5.c
745
PAM_LOG("Got user: %s", (const char *)user);
lib/libpam/modules/pam_krb5/pam_krb5.c
756
krbret = krb5_parse_name(krbctx, (const char *)user, &princ);
lib/libpam/modules/pam_ksu/pam_ksu.c
102
pamret = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_ksu/pam_ksu.c
105
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_ksu/pam_ksu.c
117
rv = get_su_principal(context, user, ruser, &su_principal_name, &su_principal);
lib/libpam/modules/pam_ksu/pam_ksu.c
120
PAM_LOG("kuserok: %s -> %s", su_principal_name, user);
lib/libpam/modules/pam_ksu/pam_ksu.c
121
rv = krb5_kuserok(context, su_principal, user);
lib/libpam/modules/pam_ksu/pam_ksu.c
96
const char *user;
lib/libpam/modules/pam_lastlog/pam_lastlog.c
107
utx = getutxuser(user);
lib/libpam/modules/pam_lastlog/pam_lastlog.c
137
strncpy(utl.ut_user, user, sizeof utl.ut_user);
lib/libpam/modules/pam_lastlog/pam_lastlog.c
72
const char *user;
lib/libpam/modules/pam_lastlog/pam_lastlog.c
77
pam_err = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_lastlog/pam_lastlog.c
80
if (user == NULL)
lib/libpam/modules/pam_lastlog/pam_lastlog.c
82
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_login_access/login_access.c
149
netgroup_match(const char *group, const char *machine, const char *user)
lib/libpam/modules/pam_login_access/login_access.c
168
if (innetgr(group, machine, user, domain) == 1)
lib/libpam/modules/pam_login_access/login_access.c
49
login_access(const char *user, const char *from,
lib/libpam/modules/pam_login_access/login_access.c
99
&& list_match(users, user, user_match, login_access_opts));
lib/libpam/modules/pam_login_access/pam_login_access.c
105
(const char *)user, (const char *)rhost);
lib/libpam/modules/pam_login_access/pam_login_access.c
106
if (login_access(user, rhost, &login_access_opts) != 0)
lib/libpam/modules/pam_login_access/pam_login_access.c
109
(const char *)user, (const char *)rhost);
lib/libpam/modules/pam_login_access/pam_login_access.c
112
(const char *)user, (const char *)tty);
lib/libpam/modules/pam_login_access/pam_login_access.c
113
if (login_access(user, tty, &login_access_opts) != 0)
lib/libpam/modules/pam_login_access/pam_login_access.c
116
(const char *)user, (const char *)tty);
lib/libpam/modules/pam_login_access/pam_login_access.c
119
(const char *)user);
lib/libpam/modules/pam_login_access/pam_login_access.c
120
if (login_access(user, "***unknown***", &login_access_opts) != 0)
lib/libpam/modules/pam_login_access/pam_login_access.c
123
(const char *)user);
lib/libpam/modules/pam_login_access/pam_login_access.c
72
const void *rhost, *tty, *user;
lib/libpam/modules/pam_login_access/pam_login_access.c
76
pam_err = pam_get_item(pamh, PAM_USER, &user);
lib/libpam/modules/pam_login_access/pam_login_access.c
80
if (user == NULL)
lib/libpam/modules/pam_login_access/pam_login_access.c
83
PAM_LOG("Got user: %s", (const char *)user);
lib/libpam/modules/pam_nologin/pam_nologin.c
67
const char *user, *nologin;
lib/libpam/modules/pam_nologin/pam_nologin.c
70
retval = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_nologin/pam_nologin.c
74
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_nologin/pam_nologin.c
76
pwd = getpwnam(user);
lib/libpam/modules/pam_nologin/pam_nologin.c
87
PAM_LOG("Unable to get login class for user %s", user);
lib/libpam/modules/pam_permit/pam_permit.c
44
const char *user;
lib/libpam/modules/pam_permit/pam_permit.c
47
if ((r = pam_get_user(pamh, &user, NULL)) != PAM_SUCCESS)
lib/libpam/modules/pam_radius/pam_radius.c
101
if ((user != NULL &&
lib/libpam/modules/pam_radius/pam_radius.c
102
rad_put_string(radh, RAD_USER_NAME, user) == -1) ||
lib/libpam/modules/pam_radius/pam_radius.c
214
do_challenge(pam_handle_t *pamh, struct rad_handle *radh, const char *user,
lib/libpam/modules/pam_radius/pam_radius.c
282
if (build_access_request(radh, user, resp[num_msgs-1].resp, nas_id,
lib/libpam/modules/pam_radius/pam_radius.c
298
const char *user, *pass;
lib/libpam/modules/pam_radius/pam_radius.c
310
retval = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_radius/pam_radius.c
314
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_radius/pam_radius.c
338
if (build_access_request(radh, user, pass, nas_id, nas_ipaddr, rhost,
lib/libpam/modules/pam_radius/pam_radius.c
384
retval = do_challenge(pamh, radh, user, nas_id,
lib/libpam/modules/pam_radius/pam_radius.c
78
build_access_request(struct rad_handle *radh, const char *user,
lib/libpam/modules/pam_rhosts/pam_rhosts.c
57
const char *user;
lib/libpam/modules/pam_rhosts/pam_rhosts.c
61
err = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_rhosts/pam_rhosts.c
65
if ((pw = getpwnam(user)) == NULL)
lib/libpam/modules/pam_rhosts/pam_rhosts.c
79
superuser = (strcmp(user, "root") == 0);
lib/libpam/modules/pam_rhosts/pam_rhosts.c
80
err = ruserok(rhost, superuser, ruser, user);
lib/libpam/modules/pam_securetty/pam_securetty.c
59
const char *user;
lib/libpam/modules/pam_securetty/pam_securetty.c
63
pam_err = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_securetty/pam_securetty.c
66
if (user == NULL || (pwd = getpwnam(user)) == NULL)
lib/libpam/modules/pam_securetty/pam_securetty.c
69
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_ssh/pam_ssh.c
158
const char **kfn, *passphrase, *user;
lib/libpam/modules/pam_ssh/pam_ssh.c
170
pam_err = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_ssh/pam_ssh.c
173
pwd = getpwnam(user);
lib/libpam/modules/pam_ssh/pam_ssh.c
380
const char *user;
lib/libpam/modules/pam_ssh/pam_ssh.c
390
pam_err = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_ssh/pam_ssh.c
393
pwd = getpwnam(user);
lib/libpam/modules/pam_tacplus/pam_tacplus.c
178
const char *user;
lib/libpam/modules/pam_tacplus/pam_tacplus.c
192
user = (const char *)item;
lib/libpam/modules/pam_tacplus/pam_tacplus.c
193
if (getpwnam(user) == NULL) {
lib/libpam/modules/pam_unix/pam_unix.c
103
pwd = getpwnam(user);
lib/libpam/modules/pam_unix/pam_unix.c
105
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_unix/pam_unix.c
170
const char *user;
lib/libpam/modules/pam_unix/pam_unix.c
174
retval = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_unix/pam_unix.c
178
if (user == NULL || (pwd = getpwnam(user)) == NULL)
lib/libpam/modules/pam_unix/pam_unix.c
181
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_unix/pam_unix.c
200
PAM_LOG("Unable to get login class for user %s", user);
lib/libpam/modules/pam_unix/pam_unix.c
289
const char *user, *old_pass, *new_pass;
lib/libpam/modules/pam_unix/pam_unix.c
295
user = getlogin();
lib/libpam/modules/pam_unix/pam_unix.c
297
retval = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_unix/pam_unix.c
301
pwd = getpwnam(user);
lib/libpam/modules/pam_unix/pam_unix.c
306
PAM_LOG("Got user: %s", user);
lib/libpam/modules/pam_unix/pam_unix.c
93
const char *pass, *user, *realpw, *prompt;
lib/libpam/modules/pam_unix/pam_unix.c
97
user = getlogin();
lib/libpam/modules/pam_unix/pam_unix.c
99
retval = pam_get_user(pamh, &user, NULL);
lib/libpam/modules/pam_xdg/pam_xdg.c
101
rv = fchownat(rt_dir_prefix, user, passwd->pw_uid, passwd->pw_gid, 0);
lib/libpam/modules/pam_xdg/pam_xdg.c
103
PAM_VERBOSE_ERROR("fchownat: %s/%s (%d)", RUNTIME_DIR_PREFIX, user, rv);
lib/libpam/modules/pam_xdg/pam_xdg.c
104
rv = unlinkat(rt_dir_prefix, user, AT_REMOVEDIR);
lib/libpam/modules/pam_xdg/pam_xdg.c
106
PAM_VERBOSE_ERROR("unlinkat: %s/%s (%d)", RUNTIME_DIR_PREFIX, user, errno);
lib/libpam/modules/pam_xdg/pam_xdg.c
113
rv = fstatat(rt_dir_prefix, user, &sb, 0);
lib/libpam/modules/pam_xdg/pam_xdg.c
115
PAM_VERBOSE_ERROR("fstatat %s/%s failed (%d)", RUNTIME_DIR_PREFIX, user, errno);
lib/libpam/modules/pam_xdg/pam_xdg.c
121
PAM_VERBOSE_ERROR("%s/%s isn't owned by %d:%d\n", RUNTIME_DIR_PREFIX, user, passwd->pw_uid, passwd->pw_gid);
lib/libpam/modules/pam_xdg/pam_xdg.c
127
PAM_VERBOSE_ERROR("%s/%s have wrong mode\n", RUNTIME_DIR_PREFIX, user);
lib/libpam/modules/pam_xdg/pam_xdg.c
134
rv = asprintf(&runtime_dir, "XDG_RUNTIME_DIR=%s/%s", RUNTIME_DIR_PREFIX, user);
lib/libpam/modules/pam_xdg/pam_xdg.c
149
rv = asprintf(&xdg_session_file, "%s/xdg_session.%d", user, i);
lib/libpam/modules/pam_xdg/pam_xdg.c
213
const char *user;
lib/libpam/modules/pam_xdg/pam_xdg.c
224
rv = pam_get_item(pamh, PAM_USER, (const void **)&user);
lib/libpam/modules/pam_xdg/pam_xdg.c
225
if (rv != PAM_SUCCESS || user == NULL) {
lib/libpam/modules/pam_xdg/pam_xdg.c
229
if ((passwd = getpwnam(user)) == NULL) {
lib/libpam/modules/pam_xdg/pam_xdg.c
243
rv = fstatat(rt_dir_prefix, user, &sb, 0);
lib/libpam/modules/pam_xdg/pam_xdg.c
245
PAM_VERBOSE_ERROR("fstatat %s/%s failed (%d)", RUNTIME_DIR_PREFIX, user, errno);
lib/libpam/modules/pam_xdg/pam_xdg.c
251
PAM_VERBOSE_ERROR("%s/%s isn't owned by %d:%d\n", RUNTIME_DIR_PREFIX, user, passwd->pw_uid, passwd->pw_gid);
lib/libpam/modules/pam_xdg/pam_xdg.c
257
PAM_VERBOSE_ERROR("%s/%s have wrong mode\n", RUNTIME_DIR_PREFIX, user);
lib/libpam/modules/pam_xdg/pam_xdg.c
263
rt_dir = openat(rt_dir_prefix, user, O_DIRECTORY | O_NOFOLLOW);
lib/libpam/modules/pam_xdg/pam_xdg.c
265
PAM_VERBOSE_ERROR("openat: %s/%s failed (%d)\n", RUNTIME_DIR_PREFIX, user, rt_dir_prefix);
lib/libpam/modules/pam_xdg/pam_xdg.c
272
rv = asprintf(&xdg_session_file, "%s/xdg_session.%d", user, i);
lib/libpam/modules/pam_xdg/pam_xdg.c
297
if (unlinkat(rt_dir_prefix, user, AT_REMOVEDIR) != 0) {
lib/libpam/modules/pam_xdg/pam_xdg.c
298
PAM_VERBOSE_ERROR("Can't cleanup %s/%s\n", runtime_dir_prefix, user);
lib/libpam/modules/pam_xdg/pam_xdg.c
57
const char *user;
lib/libpam/modules/pam_xdg/pam_xdg.c
69
rv = pam_get_item(pamh, PAM_USER, (const void **)&user);
lib/libpam/modules/pam_xdg/pam_xdg.c
70
if (rv != PAM_SUCCESS || user == NULL) {
lib/libpam/modules/pam_xdg/pam_xdg.c
74
if ((passwd = getpwnam(user)) == NULL) {
lib/libpam/modules/pam_xdg/pam_xdg.c
93
rt_dir = openat(rt_dir_prefix, user, O_DIRECTORY | O_NOFOLLOW);
lib/libpam/modules/pam_xdg/pam_xdg.c
95
rt_dir = mkdirat(rt_dir_prefix, user, RUNTIME_DIR_MODE);
lib/libpam/modules/pam_xdg/pam_xdg.c
97
PAM_VERBOSE_ERROR("mkdir: %s/%s (%d)", RUNTIME_DIR_PREFIX, user, rt_dir);
lib/libsecureboot/openpgp/opgp_key.c
186
key->user = NEW(OpenPGP_user);
lib/libsecureboot/openpgp/opgp_key.c
188
(decoder_t)decode_user, key->user);
lib/libsecureboot/openpgp/opgp_key.c
40
decode_user(int tag, unsigned char **pptr, size_t len, OpenPGP_user *user)
lib/libsecureboot/openpgp/opgp_key.c
45
user->id = malloc(len + 1);
lib/libsecureboot/openpgp/opgp_key.c
46
strncpy(user->id, (char *)*pptr, len);
lib/libsecureboot/openpgp/opgp_key.c
47
user->id[len] = '\0';
lib/libsecureboot/openpgp/opgp_key.c
48
user->name = user->id;
lib/libsecureboot/openpgp/opgp_key.c
49
cp = strchr(user->id, '<');
lib/libsecureboot/openpgp/opgp_key.c
50
if (cp > user->id) {
lib/libsecureboot/openpgp/opgp_key.c
51
user->id = strdup(user->id);
lib/libsecureboot/openpgp/opgp_sig.c
382
key->user ? key->user->name : "someone");
lib/libsecureboot/openpgp/packet.h
42
OpenPGP_user *user;
lib/libsecureboot/openpgp/packet.h
79
DECODER_DECL(user);
lib/libtacplus/taclib.c
1017
if (add_str_8(h, &as->user_len, &h->user) == -1 ||
lib/libtacplus/taclib.c
1079
if (add_str_8(h, &areq->user_len, &h->user) == -1 ||
lib/libtacplus/taclib.c
1143
if (add_str_8(h, &as->user_len, &h->user) == -1 ||
lib/libtacplus/taclib.c
1207
tac_set_user(struct tac_handle *h, const char *user)
lib/libtacplus/taclib.c
1209
return save_str(h, &h->user, user, user != NULL ? strlen(user) : 0);
lib/libtacplus/taclib.c
772
free_str(&h->user);
lib/libtacplus/taclib.c
949
free_str(&h->user);
lib/libtacplus/taclib.c
988
init_str(&h->user);
lib/libtacplus/taclib_private.h
170
struct tac_str user;
lib/libulog/ulog_login.c
63
ulog_login(const char *line, const char *user, const char *host)
lib/libulog/ulog_login.c
69
strlcpy(utx.ut_user, user, sizeof utx.ut_user);
lib/libutil/pw_util.c
243
pw_mkdb(const char *user)
lib/libutil/pw_util.c
254
if (user == NULL)
lib/libutil/pw_util.c
259
"-d", passwd_dir, "-u", user, tempname,
libexec/revnetgroup/revnetgroup.c
145
while(__getnetgrent(&host, &user, &domain) != 0) {
libexec/revnetgroup/revnetgroup.c
146
if (hosts ? host && strcmp(host,"-") : user && strcmp(user, "-"))
libexec/revnetgroup/revnetgroup.c
147
mstore(mtable, hosts ? host : user, gcur->key, domain);
libexec/revnetgroup/revnetgroup.c
74
char *host, *user, *domain;
libexec/ulog-helper/ulog-helper.c
74
const char *line, *user, *host;
libexec/ulog-helper/ulog-helper.c
82
user = get_username();
libexec/ulog-helper/ulog-helper.c
83
if (user == NULL)
libexec/ulog-helper/ulog-helper.c
89
ulog_login(line, user, host);
sbin/mdmfs/mdmfs.c
656
char *user, *group; /* Result of extracton. */
sbin/mdmfs/mdmfs.c
671
user = strsep(&group, ":");
sbin/mdmfs/mdmfs.c
672
if (user == NULL || group == NULL || *user == '\0' || *group == '\0')
sbin/mdmfs/mdmfs.c
676
*uid = strtoul(user, &p, 10);
sbin/mdmfs/mdmfs.c
680
pw = getpwnam(user);
sbin/mdmfs/mdmfs.c
682
errx(1, "invalid user: %s", user);
sbin/reboot/reboot.c
263
const char *progname, *user;
sbin/reboot/reboot.c
419
if ((user = getlogin()) == NULL)
sbin/reboot/reboot.c
420
user = (pw = getpwuid(getuid())) ?
sbin/reboot/reboot.c
424
syslog(LOG_CRIT, "halted by %s", user);
sbin/reboot/reboot.c
427
syslog(LOG_CRIT, "rerooted by %s", user);
sbin/reboot/reboot.c
430
syslog(LOG_CRIT, "powered off by %s", user);
sbin/reboot/reboot.c
433
syslog(LOG_CRIT, "power cycled by %s", user);
sbin/reboot/reboot.c
436
syslog(LOG_CRIT, "rebooted by %s", user);
stand/ficl/ficl.h
494
CELL user[FICL_USER_CELLS];
stand/ficl/words.c
4089
PUSHPTR(&pVM->user[i]);
sys/arm/include/profile.h
96
void user(void);
sys/arm/include/profile.h
99
((pc < (uintfptr_t)VM_MAXUSER_ADDRESS) ? (uintfptr_t)user : pc)
sys/arm64/arm64/ptrauth.c
329
LOAD_KEY(user, apia, APIA);
sys/arm64/arm64/ptrauth.c
330
LOAD_KEY(user, apib, APIB);
sys/arm64/arm64/ptrauth.c
331
LOAD_KEY(user, apda, APDA);
sys/arm64/arm64/ptrauth.c
332
LOAD_KEY(user, apdb, APDB);
sys/arm64/arm64/ptrauth.c
333
LOAD_KEY(user, apga, APGA);
sys/dev/ahci/ahci.c
2661
sata_rev = ch->user[ch->pm_present ? 15 : 0].revision;
sys/dev/ahci/ahci.c
2755
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/ahci/ahci.c
2785
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/ahci/ahci.c
2814
ch->user[ccb->ccb_h.target_id].caps;
sys/dev/ahci/ahci.c
837
ch->user[i].revision = sata_rev;
sys/dev/ahci/ahci.c
838
ch->user[i].mode = 0;
sys/dev/ahci/ahci.c
839
ch->user[i].bytecount = 8192;
sys/dev/ahci/ahci.c
840
ch->user[i].tags = ch->numslots;
sys/dev/ahci/ahci.c
841
ch->user[i].caps = 0;
sys/dev/ahci/ahci.c
842
ch->curr[i] = ch->user[i];
sys/dev/ahci/ahci.c
844
ch->user[i].caps = CTS_SATA_CAPS_H_PMREQ |
sys/dev/ahci/ahci.c
848
ch->user[i].caps |= CTS_SATA_CAPS_H_DMAAA |
sys/dev/ahci/ahci.h
465
struct ahci_device user[16]; /* User-specified settings */
sys/dev/aic7xxx/aic79xx.c
2883
transinfo = &tinfo->user;
sys/dev/aic7xxx/aic79xx.c
2965
*offset = MIN(*offset, tinfo->user.offset);
sys/dev/aic7xxx/aic79xx.c
2993
*bus_width = MIN(tinfo->user.width, *bus_width);
sys/dev/aic7xxx/aic79xx.c
3073
tinfo->user.period = period;
sys/dev/aic7xxx/aic79xx.c
3074
tinfo->user.offset = offset;
sys/dev/aic7xxx/aic79xx.c
3075
tinfo->user.ppr_options = ppr_options;
sys/dev/aic7xxx/aic79xx.c
3209
tinfo->user.width = width;
sys/dev/aic7xxx/aic79xx.c
6829
tinfo->user.protocol_version = 4;
sys/dev/aic7xxx/aic79xx.c
6830
tinfo->user.transport_version = 4;
sys/dev/aic7xxx/aic79xx.c
6837
tinfo->user.period = AHD_SYNCRATE_DT;
sys/dev/aic7xxx/aic79xx.c
6839
tinfo->user.period = AHD_SYNCRATE_160;
sys/dev/aic7xxx/aic79xx.c
6841
tinfo->user.offset = MAX_OFFSET;
sys/dev/aic7xxx/aic79xx.c
6842
tinfo->user.ppr_options = MSG_EXT_PPR_RD_STRM
sys/dev/aic7xxx/aic79xx.c
6849
tinfo->user.ppr_options |= MSG_EXT_PPR_RTI;
sys/dev/aic7xxx/aic79xx.c
6851
tinfo->user.width = MSG_EXT_WDTR_BUS_16_BIT;
sys/dev/aic7xxx/aic79xx.c
6907
user_tinfo = &tinfo->user;
sys/dev/aic7xxx/aic79xx.c
6912
tinfo->user.protocol_version = 4;
sys/dev/aic7xxx/aic79xx.c
6913
tinfo->user.transport_version = 4;
sys/dev/aic7xxx/aic79xx.h
780
struct ahd_transinfo user;
sys/dev/aic7xxx/aic79xx_osm.c
766
tinfo->user.protocol_version = cts->protocol_version;
sys/dev/aic7xxx/aic79xx_osm.c
767
tinfo->user.transport_version = cts->transport_version;
sys/dev/aic7xxx/aic79xx_osm.c
796
spi->ppr_options = tinfo->user.ppr_options;
sys/dev/aic7xxx/aic79xx_osm.c
803
spi->sync_offset = tinfo->user.offset;
sys/dev/aic7xxx/aic79xx_osm.c
810
spi->sync_period = tinfo->user.period;
sys/dev/aic7xxx/aic79xx_osm.c
870
tinfo = &targ_info->user;
sys/dev/aic7xxx/aic7xxx.c
1671
transinfo = &tinfo->user;
sys/dev/aic7xxx/aic7xxx.c
1810
*offset = MIN(*offset, tinfo->user.offset);
sys/dev/aic7xxx/aic7xxx.c
1838
*bus_width = MIN(tinfo->user.width, *bus_width);
sys/dev/aic7xxx/aic7xxx.c
1918
tinfo->user.period = period;
sys/dev/aic7xxx/aic7xxx.c
1919
tinfo->user.offset = offset;
sys/dev/aic7xxx/aic7xxx.c
1920
tinfo->user.ppr_options = ppr_options;
sys/dev/aic7xxx/aic7xxx.c
2034
tinfo->user.width = width;
sys/dev/aic7xxx/aic7xxx.c
5031
tinfo->user.width = MSG_EXT_WDTR_BUS_16_BIT;
sys/dev/aic7xxx/aic7xxx.c
5037
tinfo->user.period = ahc_syncrates->period;
sys/dev/aic7xxx/aic7xxx.c
5038
tinfo->user.offset = MAX_OFFSET;
sys/dev/aic7xxx/aic7xxx.c
5068
tinfo->user.period =
sys/dev/aic7xxx/aic7xxx.c
5071
tinfo->user.period = 0;
sys/dev/aic7xxx/aic7xxx.c
5073
tinfo->user.offset = MAX_OFFSET;
sys/dev/aic7xxx/aic7xxx.c
5076
tinfo->user.ppr_options =
sys/dev/aic7xxx/aic7xxx.c
5085
tinfo->user.period =
sys/dev/aic7xxx/aic7xxx.c
5090
if (tinfo->user.period != 0)
sys/dev/aic7xxx/aic7xxx.c
5091
tinfo->user.offset = MAX_OFFSET;
sys/dev/aic7xxx/aic7xxx.c
5093
if (tinfo->user.period == 0)
sys/dev/aic7xxx/aic7xxx.c
5094
tinfo->user.offset = 0;
sys/dev/aic7xxx/aic7xxx.c
5097
tinfo->user.width = MSG_EXT_WDTR_BUS_16_BIT;
sys/dev/aic7xxx/aic7xxx.c
5098
tinfo->user.protocol_version = 4;
sys/dev/aic7xxx/aic7xxx.c
5100
tinfo->user.transport_version = 3;
sys/dev/aic7xxx/aic7xxx.c
5102
tinfo->user.transport_version = 2;
sys/dev/aic7xxx/aic7xxx.h
728
struct ahc_transinfo user;
sys/dev/aic7xxx/aic7xxx_osm.c
644
tinfo->user.protocol_version =
sys/dev/aic7xxx/aic7xxx_osm.c
646
tinfo->user.transport_version =
sys/dev/aic7xxx/aic7xxx_osm.c
677
spi->ppr_options = tinfo->user.ppr_options;
sys/dev/aic7xxx/aic7xxx_osm.c
684
spi->sync_offset = tinfo->user.offset;
sys/dev/aic7xxx/aic7xxx_osm.c
691
spi->sync_period = tinfo->user.period;
sys/dev/aic7xxx/aic7xxx_osm.c
851
tinfo = &targ_info->user;
sys/dev/ata/ata-all.c
1031
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/ata/ata-all.c
1078
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/ata/ata-all.c
1103
ch->user[ccb->ccb_h.target_id].caps;
sys/dev/ata/ata-all.c
1127
ch->user[ccb->ccb_h.target_id].caps;
sys/dev/ata/ata-all.c
114
ch->user[i].revision = 0;
sys/dev/ata/ata-all.c
122
ch->user[i].revision = mode;
sys/dev/ata/ata-all.c
123
ch->user[i].mode = 0;
sys/dev/ata/ata-all.c
134
ch->user[i].mode = mode;
sys/dev/ata/ata-all.c
136
ch->user[i].bytecount = 8192;
sys/dev/ata/ata-all.c
138
ch->user[i].bytecount = 65536;
sys/dev/ata/ata-all.c
139
ch->user[i].caps = 0;
sys/dev/ata/ata-all.c
140
ch->curr[i] = ch->user[i];
sys/dev/ata/ata-all.c
143
ch->user[i].caps |= CTS_SATA_CAPS_H_PMREQ;
sys/dev/ata/ata-all.c
145
ch->user[i].caps |= CTS_SATA_CAPS_D_PMREQ;
sys/dev/ata/ata-all.c
148
ch->user[i].caps |= CTS_ATA_CAPS_H_DMA48;
sys/dev/ata/ata-all.h
438
struct ata_cam_device user[16]; /* User-specified settings */
sys/dev/ata/ata-sata.c
158
sata_rev = ch->user[port < 0 ? 0 : port].revision;
sys/dev/bwn/if_bwn_phy_lp.c
2341
bwn_phy_lp_set_deaf(struct bwn_mac *mac, uint8_t user)
sys/dev/bwn/if_bwn_phy_lp.c
2345
if (user)
sys/dev/bwn/if_bwn_phy_lp.c
2354
bwn_phy_lp_clear_deaf(struct bwn_mac *mac, uint8_t user)
sys/dev/bwn/if_bwn_phy_lp.c
2360
if (user)
sys/dev/cxgbe/common/common.h
1065
enum t4_bar2_qtype qtype, int user, u64 *pbar2_qoffset,
sys/dev/cxgbe/common/t4_hw.c
11294
int user,
sys/dev/cxgbe/common/t4_hw.c
11305
if (!user && is_t4(adapter))
sys/dev/cxgbe/iw_cxgbe/cq.c
103
int user = (uctx != &rdev->uctx);
sys/dev/cxgbe/iw_cxgbe/cq.c
117
if (!user) {
sys/dev/cxgbe/iw_cxgbe/cq.c
180
t4_bar2_sge_qregs(rdev->adap, cq->cqid, T4_BAR2_QTYPE_INGRESS, user,
sys/dev/cxgbe/iw_cxgbe/cq.c
186
if (user)
sys/dev/cxgbe/iw_cxgbe/qp.c
131
int user = (uctx != &rdev->uctx);
sys/dev/cxgbe/iw_cxgbe/qp.c
154
if (!user) {
sys/dev/cxgbe/iw_cxgbe/qp.c
208
t4_bar2_sge_qregs(rdev->adap, wq->sq.qid, T4_BAR2_QTYPE_EGRESS, user,
sys/dev/cxgbe/iw_cxgbe/qp.c
210
t4_bar2_sge_qregs(rdev->adap, wq->rq.qid, T4_BAR2_QTYPE_EGRESS, user,
sys/dev/cxgbe/iw_cxgbe/qp.c
213
if (user) {
sys/dev/drm2/drmP.h
1636
#define DRM_COPY_TO_USER(user, kern, size) \
sys/dev/drm2/drmP.h
1637
copyout(kern, user, size)
sys/dev/drm2/drmP.h
1638
#define DRM_COPY_FROM_USER(kern, user, size) \
sys/dev/drm2/drmP.h
1639
copyin(user, kern, size)
sys/dev/hptiop/hptiop.c
1126
void *user, int size)
sys/dev/hptiop/hptiop.c
1132
if (copyin((u_int8_t *)user + i, &byte, 1))
sys/dev/hptiop/hptiop.c
1141
void *user, int size)
sys/dev/hptiop/hptiop.c
1148
if (copyout(&byte, (u_int8_t *)user + i, 1))
sys/dev/mpr/mpr_user.c
2500
struct mpr_usr_command user;
sys/dev/mpr/mpr_user.c
2553
PTRIN_CP(*user32, arg.user, req);
sys/dev/mpr/mpr_user.c
2554
CP(*user32, arg.user, req_len);
sys/dev/mpr/mpr_user.c
2555
PTRIN_CP(*user32, arg.user, rpl);
sys/dev/mpr/mpr_user.c
2556
CP(*user32, arg.user, rpl_len);
sys/dev/mpr/mpr_user.c
2557
PTRIN_CP(*user32, arg.user, buf);
sys/dev/mpr/mpr_user.c
2558
CP(*user32, arg.user, len);
sys/dev/mpr/mpr_user.c
2559
CP(*user32, arg.user, flags);
sys/dev/mpr/mpr_user.c
2603
PTROUT_CP(arg.user, *user32, req);
sys/dev/mpr/mpr_user.c
2604
CP(arg.user, *user32, req_len);
sys/dev/mpr/mpr_user.c
2605
PTROUT_CP(arg.user, *user32, rpl);
sys/dev/mpr/mpr_user.c
2606
CP(arg.user, *user32, rpl_len);
sys/dev/mpr/mpr_user.c
2607
PTROUT_CP(arg.user, *user32, buf);
sys/dev/mpr/mpr_user.c
2608
CP(arg.user, *user32, len);
sys/dev/mpr/mpr_user.c
2609
CP(arg.user, *user32, flags);
sys/dev/mps/mps_user.c
2387
struct mps_usr_command user;
sys/dev/mps/mps_user.c
2440
PTRIN_CP(*user32, arg.user, req);
sys/dev/mps/mps_user.c
2441
CP(*user32, arg.user, req_len);
sys/dev/mps/mps_user.c
2442
PTRIN_CP(*user32, arg.user, rpl);
sys/dev/mps/mps_user.c
2443
CP(*user32, arg.user, rpl_len);
sys/dev/mps/mps_user.c
2444
PTRIN_CP(*user32, arg.user, buf);
sys/dev/mps/mps_user.c
2445
CP(*user32, arg.user, len);
sys/dev/mps/mps_user.c
2446
CP(*user32, arg.user, flags);
sys/dev/mps/mps_user.c
2490
PTROUT_CP(arg.user, *user32, req);
sys/dev/mps/mps_user.c
2491
CP(arg.user, *user32, req_len);
sys/dev/mps/mps_user.c
2492
PTROUT_CP(arg.user, *user32, rpl);
sys/dev/mps/mps_user.c
2493
CP(arg.user, *user32, rpl_len);
sys/dev/mps/mps_user.c
2494
PTROUT_CP(arg.user, *user32, buf);
sys/dev/mps/mps_user.c
2495
CP(arg.user, *user32, len);
sys/dev/mps/mps_user.c
2496
CP(arg.user, *user32, flags);
sys/dev/mvs/mvs.c
133
ch->user[i].revision = sata_rev;
sys/dev/mvs/mvs.c
134
ch->user[i].mode = 0;
sys/dev/mvs/mvs.c
135
ch->user[i].bytecount = (ch->quirks & MVS_Q_GENIIE) ? 8192 : 2048;
sys/dev/mvs/mvs.c
136
ch->user[i].tags = MVS_MAX_SLOTS;
sys/dev/mvs/mvs.c
137
ch->curr[i] = ch->user[i];
sys/dev/mvs/mvs.c
139
ch->user[i].caps = CTS_SATA_CAPS_H_PMREQ |
sys/dev/mvs/mvs.c
143
ch->user[i].caps |= CTS_SATA_CAPS_H_AN;
sys/dev/mvs/mvs.c
2203
sata_rev = ch->user[ch->pm_present ? 15 : 0].revision;
sys/dev/mvs/mvs.c
2299
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/mvs/mvs.c
2331
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/mvs/mvs.c
2353
ch->user[ccb->ccb_h.target_id].caps;
sys/dev/mvs/mvs.h
585
struct mvs_device user[16]; /* User-specified settings */
sys/dev/ofw/openfirmio.c
101
error = copyin(user, cp, len);
sys/dev/ofw/openfirmio.c
91
openfirm_getstr(int len, const char *user, char **cpp)
sys/dev/siis/siis.c
1627
sata_rev = ch->user[ch->pm_present ? 15 : 0].revision;
sys/dev/siis/siis.c
1852
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/siis/siis.c
1887
d = &ch->user[ccb->ccb_h.target_id];
sys/dev/siis/siis.c
1909
ch->user[ccb->ccb_h.target_id].caps;
sys/dev/siis/siis.c
474
ch->user[i].revision = sata_rev;
sys/dev/siis/siis.c
475
ch->user[i].mode = 0;
sys/dev/siis/siis.c
476
ch->user[i].bytecount = 8192;
sys/dev/siis/siis.c
477
ch->user[i].tags = SIIS_MAX_SLOTS;
sys/dev/siis/siis.c
478
ch->curr[i] = ch->user[i];
sys/dev/siis/siis.c
480
ch->user[i].caps = CTS_SATA_CAPS_H_PMREQ;
sys/dev/siis/siis.c
481
ch->user[i].caps |= CTS_SATA_CAPS_H_AN;
sys/dev/siis/siis.h
391
struct siis_device user[16]; /* User-specified settings */
sys/dev/sym/sym_hipd.c
1043
struct sym_trans user;
sys/dev/sym/sym_hipd.c
2716
tp->tinfo.user.scsi_version = tp->tinfo.current.scsi_version= 2;
sys/dev/sym/sym_hipd.c
2717
tp->tinfo.user.spi_version = tp->tinfo.current.spi_version = 2;
sys/dev/sym/sym_hipd.c
2718
tp->tinfo.user.period = np->minsync;
sys/dev/sym/sym_hipd.c
2720
tp->tinfo.user.period = np->minsync_dt;
sys/dev/sym/sym_hipd.c
2721
tp->tinfo.user.offset = np->maxoffs;
sys/dev/sym/sym_hipd.c
2722
tp->tinfo.user.width = np->maxwide ? BUS_16_BIT : BUS_8_BIT;
sys/dev/sym/sym_hipd.c
2733
if (tp->tinfo.user.period <= 9 &&
sys/dev/sym/sym_hipd.c
2734
tp->tinfo.user.width == BUS_16_BIT) {
sys/dev/sym/sym_hipd.c
2735
tp->tinfo.user.options |= PPR_OPT_DT;
sys/dev/sym/sym_hipd.c
2736
tp->tinfo.user.offset = np->maxoffs_dt;
sys/dev/sym/sym_hipd.c
2737
tp->tinfo.user.spi_version = 3;
sys/dev/sym/sym_hipd.c
5621
if (ofs > tp->tinfo.user.offset)
sys/dev/sym/sym_hipd.c
5622
{chg = 1; ofs = tp->tinfo.user.offset;}
sys/dev/sym/sym_hipd.c
5630
if (per < tp->tinfo.user.period)
sys/dev/sym/sym_hipd.c
5631
{chg = 1; per = tp->tinfo.user.period;}
sys/dev/sym/sym_hipd.c
5725
if (wide > tp->tinfo.user.width)
sys/dev/sym/sym_hipd.c
5726
{chg = 1; wide = tp->tinfo.user.width;}
sys/dev/sym/sym_hipd.c
5742
if (ofs > tp->tinfo.user.offset)
sys/dev/sym/sym_hipd.c
5743
{chg = 1; ofs = tp->tinfo.user.offset;}
sys/dev/sym/sym_hipd.c
5755
if (per < tp->tinfo.user.period)
sys/dev/sym/sym_hipd.c
5756
{chg = 1; per = tp->tinfo.user.period;}
sys/dev/sym/sym_hipd.c
5859
if (wide > tp->tinfo.user.width)
sys/dev/sym/sym_hipd.c
5860
{chg = 1; wide = tp->tinfo.user.width;}
sys/dev/sym/sym_hipd.c
7959
sym_update_trans(np, &tp->tinfo.user, cts);
sys/dev/sym/sym_hipd.c
7978
tip = &tp->tinfo.user;
sys/dev/sym/sym_hipd.c
9009
tp->tinfo.user.period = tn->sync_period ? (tn->sync_period + 3) / 4 : 0;
sys/dev/sym/sym_hipd.c
9010
tp->tinfo.user.width = tn->bus_width == 0x10 ? BUS_16_BIT : BUS_8_BIT;
sys/dev/sym/sym_hipd.c
9034
tp->tinfo.user.period = Tekram_sync[i];
sys/dev/sym/sym_hipd.c
9037
tp->tinfo.user.width =
sys/dev/xdma/xdma.h
114
void *user;
sys/dev/xdma/xdma.h
264
int xdma_dequeue(xdma_channel_t *xchan, void **user,
sys/dev/xdma/xdma_queue.c
46
xdma_dequeue(xdma_channel_t *xchan, void **user,
sys/dev/xdma/xdma_queue.c
62
*user = xr->user;
sys/dev/xdma/xdma_queue.c
74
enum xdma_direction dir, void *user)
sys/dev/xdma/xdma_queue.c
84
xr->user = user;
sys/dev/xen/evtchn/evtchn_dev.c
161
u = evtchn->user;
sys/dev/xen/evtchn/evtchn_dev.c
366
evtchn->user = u;
sys/dev/xen/evtchn/evtchn_dev.c
88
struct per_user_data *user;
sys/dev/xen/xenstore/xenstore_dev.c
208
mtx_lock(&dwatch->user->lock);
sys/dev/xen/xenstore/xenstore_dev.c
209
xs_queue_reply(dwatch->user, (char *)&msg, sizeof(msg));
sys/dev/xen/xenstore/xenstore_dev.c
210
xs_queue_reply(dwatch->user, payload, msg.len);
sys/dev/xen/xenstore/xenstore_dev.c
211
mtx_unlock(&dwatch->user->lock);
sys/dev/xen/xenstore/xenstore_dev.c
338
watch->user = u;
sys/dev/xen/xenstore/xenstore_dev.c
64
struct xs_dev_data *user;
sys/fs/nfs/nfsclstate.h
289
uid_t user;
sys/fs/nfsclient/nfs_clrpcops.c
7014
tcred->cr_uid = flp->nfsfl_ffm[mirror].user;
sys/fs/nfsclient/nfs_clrpcops.c
8038
uid_t user;
sys/fs/nfsclient/nfs_clrpcops.c
8238
error = nfsrv_parseug(nd, 0, &user,
sys/fs/nfsclient/nfs_clrpcops.c
8244
&user, &grp, curthread);
sys/fs/nfsclient/nfs_clrpcops.c
8250
user, grp);
sys/fs/nfsclient/nfs_clrpcops.c
8252
flp->nfsfl_ffm[j].user = user;
sys/fs/nfsclient/nfs_clrpcops.c
8255
"usr=%d grp=%d\n", user,
sys/i386/i386/trap.c
370
goto user;
sys/i386/i386/trap.c
411
goto user;
sys/i386/i386/trap.c
721
user:
sys/kern/kern_ktrace.c
842
ktrcsw_impl(int out, int user, const char *wmesg, const struct timespec *tv)
sys/kern/kern_ktrace.c
856
kc->user = user;
sys/kern/kern_ktrace.c
868
ktrcsw(int out, int user, const char *wmesg)
sys/kern/kern_ktrace.c
870
ktrcsw_impl(out, user, wmesg, NULL);
sys/kern/kern_mib.c
83
SYSCTL_ROOT_NODE(CTL_USER, user, CTLFLAG_RW | CTLFLAG_MPSAFE, 0,
sys/kern/kern_time.c
320
struct timeval sys, user;
sys/kern/kern_time.c
346
calcru(p, &user, &sys);
sys/kern/kern_time.c
349
TIMEVAL_TO_TIMESPEC(&user, ats);
sys/kern/kern_time.c
354
calcru(p, &user, &sys);
sys/kern/kern_time.c
357
timevaladd(&user, &sys);
sys/kern/kern_time.c
358
TIMEVAL_TO_TIMESPEC(&user, ats);
sys/netinet/tcp_subr.c
4969
tcp_req_alloc_req(struct tcpcb *tp, union tcp_log_userdata *user, uint64_t ts)
sys/netinet/tcp_subr.c
4971
(void)tcp_req_alloc_req_full(tp, &user->tcp_req, ts, 1);
sys/netinet/tcp_var.h
1577
tcp_req_alloc_req(struct tcpcb *tp, union tcp_log_userdata *user,
sys/netpfil/ipfilter/netinet/ip_dstlist.c
796
ippool_dst_t user, *d, *new;
sys/netpfil/ipfilter/netinet/ip_dstlist.c
805
err = COPYIN(op->iplo_struct, &user, sizeof(user));
sys/netpfil/ipfilter/netinet/ip_dstlist.c
824
new->ipld_policy = user.ipld_policy;
sys/ofed/include/rdma/rdma_vt.h
168
int user; /* non-zero if created from user space */
sys/powerpc/mpc85xx/fsl_sata.c
1755
d = &ch->user[ccb->ccb_h.target_id];
sys/powerpc/mpc85xx/fsl_sata.c
1783
d = &ch->user[ccb->ccb_h.target_id];
sys/powerpc/mpc85xx/fsl_sata.c
1806
ch->user[ccb->ccb_h.target_id].caps;
sys/powerpc/mpc85xx/fsl_sata.c
286
struct fsl_sata_device user[16]; /* User-specified settings */
sys/powerpc/mpc85xx/fsl_sata.c
341
ch->user[i].revision = sata_rev;
sys/powerpc/mpc85xx/fsl_sata.c
342
ch->user[i].mode = 0;
sys/powerpc/mpc85xx/fsl_sata.c
343
ch->user[i].bytecount = 8192;
sys/powerpc/mpc85xx/fsl_sata.c
344
ch->user[i].tags = FSL_SATA_MAX_SLOTS;
sys/powerpc/mpc85xx/fsl_sata.c
345
ch->user[i].caps = 0;
sys/powerpc/mpc85xx/fsl_sata.c
346
ch->curr[i] = ch->user[i];
sys/powerpc/mpc85xx/fsl_sata.c
348
ch->user[i].caps = CTS_SATA_CAPS_H_PMREQ |
sys/powerpc/mpc85xx/fsl_sata.c
351
ch->user[i].caps |= CTS_SATA_CAPS_H_AN;
sys/powerpc/powerpc/trap.c
210
int sig, type, user;
sys/powerpc/powerpc/trap.c
229
user = frame->srr1 & PSL_PR;
sys/powerpc/powerpc/trap.c
233
trapname(type), user ? "user" : "kernel");
sys/powerpc/powerpc/trap.c
252
if (user) {
sys/powerpc/powerpc/trap.c
538
cpu_printtrap(u_int vector, struct trapframe *frame, int isfatal, int user)
sys/powerpc/powerpc/trap.c
573
printtrap(u_int vector, struct trapframe *frame, int isfatal, int user)
sys/powerpc/powerpc/trap.c
578
user ? "user" : "kernel");
sys/powerpc/powerpc/trap.c
595
cpu_printtrap(vector, frame, isfatal, user);
sys/powerpc/powerpc/trap.c
765
trap_pfault(struct trapframe *frame, bool user, int *signo, int *ucode)
sys/powerpc/powerpc/trap.c
819
if (user) {
sys/powerpc/powerpc/trap.c
842
if (!user && handle_onfault(frame))
sys/powerpc/powerpc/trap.c
85
int user);
sys/powerpc/powerpc/trap.c
86
static bool trap_pfault(struct trapframe *frame, bool user, int *signo,
sys/riscv/include/profile.h
54
void user(void);
sys/riscv/include/profile.h
57
((pc < (uintfptr_t)VM_MAXUSER_ADDRESS) ? (uintfptr_t)user : pc)
sys/sys/ktrace.h
160
int user; /* 1 if usermode (ivcsw), 0 if kernel (vcsw) */
sys/sys/ktrace.h
165
int user; /* 1 if usermode (ivcsw), 0 if kernel (vcsw) */
sys/sys/user.h
124
struct user *ki_addr; /* kernel virtual addr of u-area */
tests/sys/fs/fusefs/default_permissions.cc
1468
TEST_F(Setextattr, user)
tests/sys/fs/fusefs/default_permissions.cc
718
TEST_F(Deleteextattr, user)
tests/sys/fs/fusefs/xattr.cc
330
TEST_F(Getxattr, user)
tests/sys/fs/fusefs/xattr.cc
655
TEST_F(Listxattr, user)
tests/sys/fs/fusefs/xattr.cc
750
TEST_F(Removexattr, user)
tests/sys/fs/fusefs/xattr.cc
828
TEST_F(Setxattr, user)
tests/sys/fs/fusefs/xattr.cc
887
TEST_F(SetxattrExt, user)
tests/sys/net/bpf/pcap-test.c
144
inject_packet(u_char *user, const struct pcap_pkthdr *h, const u_char *bytes)
tests/sys/net/bpf/pcap-test.c
146
pcap_t *p = (pcap_t *)user;
tests/sys/net/bpf/pcap-test.c
182
store_packet(u_char *user, const struct pcap_pkthdr *h, const u_char *bytes)
tests/sys/net/bpf/pcap-test.c
184
struct plist *list = (struct plist *)user;
tests/sys/netinet/fibs_multibind_test.c
164
const char *user;
tests/sys/netinet/fibs_multibind_test.c
200
user = atf_tc_get_config_var(tc, "unprivileged_user");
tests/sys/netinet/fibs_multibind_test.c
201
passwd = getpwnam(user);
tests/sys/netinet/socket_afinet.c
343
const char *user;
tests/sys/netinet/socket_afinet.c
349
user = atf_tc_get_config_var(tc, "unprivileged_user");
tests/sys/netinet/socket_afinet.c
351
user = NULL;
tests/sys/netinet/socket_afinet.c
359
if (user != NULL) {
tests/sys/netinet/socket_afinet.c
362
passwd = getpwnam(user);
tools/tools/netmap/pkt-gen.c
1880
receive_pcap(u_char *user, const struct pcap_pkthdr * h,
tools/tools/netmap/pkt-gen.c
1883
struct my_ctrs *ctr = (struct my_ctrs *)user;
usr.bin/ctlstat/ctlstat.c
236
cpu_stats->user = cp_time[CP_USER];
usr.bin/ctlstat/ctlstat.c
633
ctx->cur_total_jiffies = ctx->cur_cpu.user +
usr.bin/ctlstat/ctlstat.c
86
uint64_t user;
usr.bin/fetch/fetch.c
394
if (fgets(URL->user, sizeof URL->user, stdin) == NULL)
usr.bin/fetch/fetch.c
396
for (i = strlen(URL->user); i >= 0; --i)
usr.bin/fetch/fetch.c
397
if (URL->user[i] == '\r' || URL->user[i] == '\n')
usr.bin/fetch/fetch.c
398
URL->user[i] = '\0';
usr.bin/finger/finger.c
224
struct utmpx *user;
usr.bin/finger/finger.c
231
while ((user = getutxent()) != NULL) {
usr.bin/finger/finger.c
232
if (user->ut_type != USER_PROCESS)
usr.bin/finger/finger.c
234
if ((pn = find_person(user->ut_user)) == NULL) {
usr.bin/finger/finger.c
235
if ((pw = getpwnam(user->ut_user)) == NULL)
usr.bin/finger/finger.c
241
enter_where(user, pn);
usr.bin/finger/finger.c
263
struct utmpx *user;
usr.bin/finger/finger.c
374
while ((user = getutxent()) != NULL) {
usr.bin/finger/finger.c
375
if (user->ut_type != USER_PROCESS)
usr.bin/finger/finger.c
377
if ((pn = find_person(user->ut_user)) == NULL)
usr.bin/finger/finger.c
379
enter_where(user, pn);
usr.bin/finger/util.c
58
match(struct passwd *pw, const char *user)
usr.bin/finger/util.c
63
if (!strcasecmp(pw->pw_name, user))
usr.bin/finger/util.c
92
if (!strcasecmp(p, user))
usr.bin/getent/getent.c
581
char *host, *user, *domain;
usr.bin/getent/getent.c
598
while (getnetgrent(&host, &user, &domain) != 0) {
usr.bin/getent/getent.c
605
NETGROUPPRINT(user),
usr.bin/ipcs/ipcs.c
112
char *core = NULL, *user = NULL, *namelist = NULL;
usr.bin/ipcs/ipcs.c
166
user = optarg;
usr.bin/ipcs/ipcs.c
167
uid = user2uid(user);
usr.bin/ipcs/ipcs.c
216
if (user &&
usr.bin/ipcs/ipcs.c
248
if (user &&
usr.bin/ipcs/ipcs.c
278
if (user &&
usr.bin/iscsictl/iscsictl.c
300
const char *target_addr, const char *user, const char *secret, int enable)
usr.bin/iscsictl/iscsictl.c
346
if (user != NULL)
usr.bin/iscsictl/iscsictl.c
347
strlcpy(conf->isc_user, user, sizeof(conf->isc_user));
usr.bin/iscsictl/iscsictl.c
637
*target = NULL, *user = NULL, *secret = NULL;
usr.bin/iscsictl/iscsictl.c
706
user = optarg;
usr.bin/iscsictl/iscsictl.c
748
if (user != NULL)
usr.bin/iscsictl/iscsictl.c
765
if (user != NULL)
usr.bin/iscsictl/iscsictl.c
788
if (user != NULL && secret == NULL)
usr.bin/iscsictl/iscsictl.c
790
if (secret != NULL && user == NULL)
usr.bin/iscsictl/iscsictl.c
809
if (user != NULL)
usr.bin/iscsictl/iscsictl.c
851
if (user != NULL)
usr.bin/iscsictl/iscsictl.c
875
if (user != NULL)
usr.bin/iscsictl/iscsictl.c
915
user, secret, enable);
usr.bin/iscsictl/iscsictl.c
937
targ->t_user = user;
usr.bin/iscsictl/parse.y
107
user
usr.bin/iscsictl/parse.y
180
user: USER EQUALS STR
usr.bin/kdump/kdump.c
1819
cs->user ? "user" : "kernel");
usr.bin/kdump/kdump.c
1826
cs->user ? "user" : "kernel", cs->wmesg);
usr.bin/killall/killall.c
102
char *user = NULL;
usr.bin/killall/killall.c
171
user = *av;
usr.bin/killall/killall.c
249
if (user == NULL && tty == NULL && cmd == NULL && !jflag && ac == 0)
usr.bin/killall/killall.c
268
if (user) {
usr.bin/killall/killall.c
269
uid = strtol(user, &ep, 10);
usr.bin/killall/killall.c
270
if (*user == '\0' || *ep != '\0') { /* was it a number? */
usr.bin/killall/killall.c
271
pw = getpwnam(user);
usr.bin/killall/killall.c
273
errx(1, "user %s does not exist", user);
usr.bin/killall/killall.c
283
user = pw->pw_name;
usr.bin/killall/killall.c
292
if (user) {
usr.bin/killall/killall.c
345
if (user) {
usr.bin/mail/v7.local.c
49
findmail(char *user, char *buf, int buflen)
usr.bin/mail/v7.local.c
54
(void)snprintf(buf, buflen, "%s/%s", _PATH_MAILDIR, user);
usr.bin/posixmqcontrol/posixmqcontrol.c
278
&creation.user, "-u", "user");
usr.bin/posixmqcontrol/posixmqcontrol.c
281
creation.user = entry->pw_uid;
usr.bin/posixmqcontrol/posixmqcontrol.c
489
q_creation.user =
usr.bin/posixmqcontrol/posixmqcontrol.c
490
q_creation.set_user ? q_creation.user : status.st_uid;
usr.bin/posixmqcontrol/posixmqcontrol.c
493
result = fchown(fd, q_creation.user, q_creation.group);
usr.bin/posixmqcontrol/posixmqcontrol.c
64
uid_t user;
usr.bin/posixmqcontrol/posixmqcontrol.c
98
.user = 0
usr.bin/sockstat/main.c
1214
int user;
usr.bin/sockstat/main.c
1385
cw->user = MAX(cw->user, len);
usr.bin/sockstat/main.c
1616
" {:fd/%*s} {:proto/%-*s}", cw->user, "??",
usr.bin/sockstat/main.c
1658
.user = strlen(__HDR_USER),
usr.bin/sockstat/main.c
1685
"{T:/%-*s} {T:/%-*s}", cw.user, __HDR_USER, cw.command,
usr.bin/sockstat/main.c
1728
xo_emit("{:user/%-*lu}", cw.user,
usr.bin/sockstat/main.c
1731
xo_emit("{:user/%-*s}", cw.user, pwd->pw_name);
usr.bin/sockstat/main.c
1752
" {:fd/%*s}", cw.user, "??", cw.command, "??",
usr.bin/sockstat/main.c
1765
" {:fd/%*s}", cw.user, "??", cw.command, "??",
usr.bin/su/su.c
153
const char *p, *user, *shell, *mytty, **nargv;
usr.bin/su/su.c
164
user = "root";
usr.bin/su/su.c
195
user = argv[optind++];
usr.bin/su/su.c
197
if (user == NULL)
usr.bin/su/su.c
214
if (strlen(user) > MAXLOGNAME - 1) {
usr.bin/su/su.c
217
EPERM, 1, "username too long: '%s'", user))
usr.bin/su/su.c
276
retcode = pam_start("su", user, &conv, &pamh);
usr.bin/su/su.c
293
username, user, mytty))
usr.bin/su/su.c
297
username, user, mytty);
usr.bin/su/su.c
306
user = v;
usr.bin/su/su.c
310
pwd = getpwnam(user);
usr.bin/su/su.c
314
"unknown subject: %s", user))
usr.bin/su/su.c
317
errx(1, "unknown login: %s", user);
usr.bin/su/su.c
540
syslog(LOG_NOTICE, "%s to %s%s", username, user,
usr.bin/tip/tip/log.c
46
char *user, *timestamp;
usr.bin/tip/tip/log.c
56
if ((user = getlogin()) == NOSTR) {
usr.bin/tip/tip/log.c
58
user = "???";
usr.bin/tip/tip/log.c
60
user = pwd->pw_name;
usr.bin/tip/tip/log.c
66
user, timestamp, group,
usr.bin/w/w.c
221
char **user;
usr.bin/w/w.c
224
for (user = sel_users; !usermatch && *user; user++)
usr.bin/w/w.c
225
if (!strcmp(utmp->ut_user, *user))
usr.bin/write/write.c
187
utmp_chk(char *user, char *tty)
usr.bin/write/write.c
194
strcmp(user, u->ut_user) == 0) {
usr.bin/write/write.c
214
search_utmp(int devfd, char *user, char *tty, char *mytty, uid_t myuid)
usr.bin/write/write.c
226
strcmp(user, u->ut_user) == 0) {
usr.bin/write/write.c
245
errx(1, "%s is not logged in", user);
usr.bin/write/write.c
251
errx(1, "%s has messages disabled", user);
usr.bin/write/write.c
253
warnx("%s is logged in more than once; writing to %s", user, tty);
usr.sbin/ac/ac.c
171
update_user(const char *user, struct timeval secs)
usr.sbin/ac/ac.c
178
c = strcmp(up->user, user);
usr.sbin/ac/ac.c
199
strlcpy(up->user, user, sizeof(up->user));
usr.sbin/ac/ac.c
260
show(const char *user, struct timeval secs)
usr.sbin/ac/ac.c
263
(int)sizeof(((struct user_entry *)0)->user), user,
usr.sbin/ac/ac.c
273
show(lp->user, lp->time);
usr.sbin/ac/ac.c
297
update_user(lp->user, diff);
usr.sbin/ac/ac.c
326
update_user(lp->user, secs);
usr.sbin/ac/ac.c
394
strlcpy(lp->user, up->ut_user, sizeof(lp->user));
usr.sbin/ac/ac.c
51
char user[sizeof(((struct utmpx *)0)->ut_user)];
usr.sbin/ac/ac.c
64
char user[sizeof(((struct utmpx *)0)->ut_user)];
usr.sbin/bluetooth/sdpd/main.c
132
if ((user != NULL || group != NULL) && drop_root(user, group) < 0)
usr.sbin/bluetooth/sdpd/main.c
151
drop_root(char const *user, char const *group)
usr.sbin/bluetooth/sdpd/main.c
163
if (user != NULL) {
usr.sbin/bluetooth/sdpd/main.c
164
uid = strtol(user, &ep, 10);
usr.sbin/bluetooth/sdpd/main.c
166
struct passwd *pwd = getpwnam(user);
usr.sbin/bluetooth/sdpd/main.c
170
"user %s", user);
usr.sbin/bluetooth/sdpd/main.c
201
user, strerror(errno), errno);
usr.sbin/bluetooth/sdpd/main.c
56
static int32_t drop_root (char const *user, char const *group);
usr.sbin/bluetooth/sdpd/main.c
71
char const *user = "nobody", *group = "nobody";
usr.sbin/bluetooth/sdpd/main.c
90
user = optarg;
usr.sbin/bsnmpd/tools/bsnmptools/bsnmpget.c
1265
if (snmp_passwd_to_keys(&snmp_client.user,
usr.sbin/bsnmpd/tools/bsnmptools/bsnmpget.c
1267
snmp_get_local_keys(&snmp_client.user,
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
145
snmp_client.user.auth_proto = SNMP_AUTH_HMAC_MD5;
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
147
snmp_client.user.auth_proto = SNMP_AUTH_HMAC_SHA;
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
155
snmp_client.user.priv_proto = SNMP_PRIV_DES;
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
157
snmp_client.user.priv_proto = SNMP_PRIV_AES;
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
163
if ((slen = strlen(str)) > sizeof(snmp_client.user.sec_name)) {
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
168
strlcpy(snmp_client.user.sec_name, str,
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
169
sizeof(snmp_client.user.sec_name));
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2093
fprintf(stdout, "Localized keys for %s\n", snmp_client.user.sec_name);
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2094
if (snmp_client.user.auth_proto == SNMP_AUTH_HMAC_MD5) {
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2097
} else if (snmp_client.user.auth_proto == SNMP_AUTH_HMAC_SHA) {
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2101
if (snmp_client.user.auth_proto != SNMP_AUTH_NOAUTH) {
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2105
snmp_client.user.auth_key[i]);
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2110
if (snmp_client.user.priv_proto == SNMP_PRIV_DES) {
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2113
} else if (snmp_client.user.priv_proto == SNMP_PRIV_AES) {
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2117
if (snmp_client.user.priv_proto != SNMP_PRIV_NOPRIV) {
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
2121
snmp_client.user.priv_key[i]);
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
505
snmp_client.user.auth_proto =
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
508
snmp_client.user.auth_proto =
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
520
if (parse_ascii(val, snmp_client.user.auth_key,
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
560
snmp_client.user.priv_proto = SNMP_PRIV_AES;
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
562
snmp_client.user.priv_proto = SNMP_PRIV_DES;
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
573
if (parse_ascii(val, snmp_client.user.priv_key,
usr.sbin/bsnmpd/tools/libbsnmptools/bsnmptools.c
690
strlcpy(snmp_client.user.sec_name, val,
usr.sbin/chroot/chroot.c
107
user = group = grouplist = NULL;
usr.sbin/chroot/chroot.c
113
user = optarg;
usr.sbin/chroot/chroot.c
114
if (*user == '\0')
usr.sbin/chroot/chroot.c
164
if (user != NULL)
usr.sbin/chroot/chroot.c
165
uid = resolve_user(user);
usr.sbin/chroot/chroot.c
186
if (user && setuid(uid) == -1)
usr.sbin/chroot/chroot.c
75
resolve_user(const char *user)
usr.sbin/chroot/chroot.c
81
pw = getpwnam(user);
usr.sbin/chroot/chroot.c
86
uid = strtoul(user, &endp, 0);
usr.sbin/chroot/chroot.c
90
errx(1, "no such user '%s'", user);
usr.sbin/chroot/chroot.c
96
const char *group, *p, *shell, *user;
usr.sbin/cron/cron/cron.c
190
user *u;
usr.sbin/cron/cron/cron.c
219
user *u;
usr.sbin/cron/cron/cron.c
452
user *u;
usr.sbin/cron/cron/cron.c
541
user *u;
usr.sbin/cron/cron/cron.c
556
user *u;
usr.sbin/cron/cron/database.c
200
link_user(cron_db *db, user *u)
usr.sbin/cron/cron/database.c
212
unlink_user(cron_db *db, user *u)
usr.sbin/cron/cron/database.c
225
user *
usr.sbin/cron/cron/database.c
228
user *u;
usr.sbin/cron/cron/database.c
242
user *u;
usr.sbin/cron/cron/database.c
45
user *u, *nu;
usr.sbin/cron/cron/do_command.c
116
child_process(entry *e, user *u)
usr.sbin/cron/cron/do_command.c
36
static void child_process(entry *, user *);
usr.sbin/cron/cron/do_command.c
42
do_command(entry *e, user *u)
usr.sbin/cron/cron/funcs.h
32
job_add(entry *, user *),
usr.sbin/cron/cron/funcs.h
33
do_command(entry *, user *),
usr.sbin/cron/cron/funcs.h
34
link_user(cron_db *, user *),
usr.sbin/cron/cron/funcs.h
35
unlink_user(cron_db *, user *),
usr.sbin/cron/cron/funcs.h
36
free_user(user *),
usr.sbin/cron/cron/funcs.h
64
user *load_user(int, struct passwd *, const char *),
usr.sbin/cron/cron/job.c
30
user *u;
usr.sbin/cron/cron/job.c
38
job_add(entry *e, user *u)
usr.sbin/cron/cron/structs.h
74
user *head, *tail; /* links */
usr.sbin/cron/cron/user.c
31
free_user(user *u)
usr.sbin/cron/cron/user.c
50
user *
usr.sbin/cron/cron/user.c
55
user *u;
usr.sbin/cron/cron/user.c
69
if ((u = (user *) malloc(sizeof(user))) == NULL) {
usr.sbin/ctld/conf.cc
113
auth_group_add_chap(const char *user, const char *secret)
usr.sbin/ctld/conf.cc
115
return (auth_group->add_chap(user, secret));
usr.sbin/ctld/conf.cc
119
auth_group_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/conf.cc
122
return (auth_group->add_chap_mutual(user, secret, user2, secret2));
usr.sbin/ctld/conf.cc
352
target_add_chap(const char *user, const char *secret)
usr.sbin/ctld/conf.cc
354
return (target->add_chap(user, secret));
usr.sbin/ctld/conf.cc
358
target_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/conf.cc
361
return (target->add_chap_mutual(user, secret, user2, secret2));
usr.sbin/ctld/conf.h
43
bool auth_group_add_chap(const char *user, const char *secret);
usr.sbin/ctld/conf.h
44
bool auth_group_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/conf.h
80
bool target_add_chap(const char *user, const char *secret);
usr.sbin/ctld/conf.h
81
bool target_add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
1303
target::add_chap(const char *user, const char *secret)
usr.sbin/ctld/ctld.cc
1307
return (t_auth_group->add_chap(user, secret));
usr.sbin/ctld/ctld.cc
1311
target::add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
1316
return (t_auth_group->add_chap_mutual(user, secret, user2, secret2));
usr.sbin/ctld/ctld.cc
213
auth_group::find_auth(std::string_view user) const
usr.sbin/ctld/ctld.cc
215
auto it = ag_auths.find(std::string(user));
usr.sbin/ctld/ctld.cc
223
auth_group::check_secret_length(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
232
"at most 16 characters long", secret_type, user, label());
usr.sbin/ctld/ctld.cc
236
"at least 12 characters long", secret_type, user, label());
usr.sbin/ctld/ctld.cc
241
auth_group::add_chap(const char *user, const char *secret)
usr.sbin/ctld/ctld.cc
251
check_secret_length(user, secret, "secret");
usr.sbin/ctld/ctld.cc
253
const auto &pair = ag_auths.try_emplace(user, secret);
usr.sbin/ctld/ctld.cc
256
user, label());
usr.sbin/ctld/ctld.cc
264
auth_group::add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.cc
275
check_secret_length(user, secret, "secret");
usr.sbin/ctld/ctld.cc
276
check_secret_length(user, secret2, "mutual secret");
usr.sbin/ctld/ctld.cc
278
const auto &pair = ag_auths.try_emplace(user, secret, user2, secret2);
usr.sbin/ctld/ctld.cc
281
user, label());
usr.sbin/ctld/ctld.hh
108
bool add_chap(const char *user, const char *secret);
usr.sbin/ctld/ctld.hh
109
bool add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/ctld.hh
111
const struct auth *find_auth(std::string_view user) const;
usr.sbin/ctld/ctld.hh
126
void check_secret_length(const char *user, const char *secret,
usr.sbin/ctld/ctld.hh
397
bool add_chap(const char *user, const char *secret);
usr.sbin/ctld/ctld.hh
398
bool add_chap_mutual(const char *user, const char *secret,
usr.sbin/ctld/login.cc
338
struct chap *chap, const struct auth **authp, std::string &user)
usr.sbin/ctld/login.cc
384
user = chap_n;
usr.sbin/ctld/login.cc
394
const struct auth *auth, const std::string &user)
usr.sbin/ctld/login.cc
428
"is not set", user.c_str());
usr.sbin/ctld/login.cc
461
std::string user;
usr.sbin/ctld/login.cc
489
request = login_receive_chap_r(&conn, ag, chap, &auth, user);
usr.sbin/ctld/login.cc
495
"transitioning to operational parameter negotiation", user.c_str());
usr.sbin/ctld/login.cc
496
login_send_chap_success(request, auth, user);
usr.sbin/ctld/login.cc
502
conn_user = user;
usr.sbin/ctld/uclparse.cc
100
auto user = obj["user"];
usr.sbin/ctld/uclparse.cc
101
if (!user || user.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
129
user.string_value().c_str(),
usr.sbin/ctld/uclparse.cc
138
auto user = obj["user"];
usr.sbin/ctld/uclparse.cc
139
if (!user || user.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
153
user.string_value().c_str(),
usr.sbin/ctld/uclparse.cc
160
auto user = obj["user"];
usr.sbin/ctld/uclparse.cc
161
if (!user || user.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
189
user.string_value().c_str(),
usr.sbin/ctld/uclparse.cc
78
auto user = obj["user"];
usr.sbin/ctld/uclparse.cc
79
if (!user || user.type() != UCL_STRING) {
usr.sbin/ctld/uclparse.cc
93
user.string_value().c_str(),
usr.sbin/daemon/daemon.c
307
state.user = optarg;
usr.sbin/daemon/daemon.c
384
if (state->user != NULL) {
usr.sbin/daemon/daemon.c
385
restrict_process(state->user);
usr.sbin/daemon/daemon.c
662
restrict_process(const char *user)
usr.sbin/daemon/daemon.c
666
pw = getpwnam(user);
usr.sbin/daemon/daemon.c
668
errx(1, "unknown user: %s", user);
usr.sbin/daemon/daemon.c
802
.user = NULL,
usr.sbin/daemon/daemon.c
81
const char *user;
usr.sbin/inetd/inetd.c
1665
char *user, *group, *perm;
usr.sbin/inetd/inetd.c
1668
user = arg+1;
usr.sbin/inetd/inetd.c
1669
if ((group = strchr(user, ':')) == NULL) {
usr.sbin/inetd/inetd.c
1670
syslog(LOG_ERR, "no group after user '%s'", user);
usr.sbin/inetd/inetd.c
1679
if ((pw = getpwnam(user)) == NULL) {
usr.sbin/inetd/inetd.c
1680
syslog(LOG_ERR, "no such user '%s'", user);
usr.sbin/lpr/common_source/displayq.c
232
for (i = 0; i < users && cp - line + 1 + strlen(user[i]) <
usr.sbin/lpr/common_source/displayq.c
236
(void) strcpy(cp, user[i]);
usr.sbin/lpr/common_source/displayq.c
486
for (u = user; u < &user[users]; u++)
usr.sbin/lpr/common_source/lp.h
174
extern char *user[]; /* users to process */
usr.sbin/lpr/common_source/rmjob.c
267
for (u = user; u < &user[users]; u++)
usr.sbin/lpr/common_source/rmjob.c
338
iov[elem + 1].iov_base = user[i];
usr.sbin/lpr/common_source/rmjob.c
95
user[0] = person;
usr.sbin/lpr/lpd/lpd.c
457
char *user[MAXUSERS]; /* users to process */
usr.sbin/lpr/lpd/lpd.c
538
user[users++] = cp;
usr.sbin/lpr/lpd/lpd.c
575
user[users++] = cp;
usr.sbin/lpr/lpq/lpq.c
114
user[users++] = *argv;
usr.sbin/lpr/lpq/lpq.c
60
char *user[MAXUSERS]; /* users to process */
usr.sbin/lpr/lprm/lprm.c
134
user[users++] = arg;
usr.sbin/lpr/lprm/lprm.c
65
char *user[MAXUSERS]; /* users to process */
usr.sbin/nologin/nologin.c
37
const char *user, *tt;
usr.sbin/nologin/nologin.c
41
if ((user = getlogin()) == NULL)
usr.sbin/nologin/nologin.c
42
user = "UNKNOWN";
usr.sbin/nologin/nologin.c
44
syslog(LOG_CRIT, "Attempted login by %s on %s", user, tt);
usr.sbin/pmc/cmd_pmc_stat.c
130
uint64_t real, user, sys;
usr.sbin/pmc/cmd_pmc_stat.c
143
user = ru->ru_utime.tv_sec * 1000000 + ru->ru_utime.tv_usec;
usr.sbin/pmc/cmd_pmc_stat.c
147
after->tv_nsec / 10000000, 100 * (double)(sys + user + 1) / (double)(real + 1));
usr.sbin/pmc/cmd_pmc_stat.c
150
ru->ru_utime.tv_usec / 10000, 100 * (double)(user + 1) / (double)(real + 1));
usr.sbin/pw/pw_group.c
134
lookup_pwent(const char *user)
usr.sbin/pw/pw_group.c
138
if ((pwd = GETPWNAM(user)) == NULL &&
usr.sbin/pw/pw_group.c
139
(!isdigit((unsigned char)*user) ||
usr.sbin/pw/pw_group.c
140
(pwd = getpwuid((uid_t) atoi(user))) == NULL))
usr.sbin/pw/pw_group.c
141
errx(EX_NOUSER, "user `%s' does not exist", user);
usr.sbin/pw/pw_group.c
42
static struct passwd *lookup_pwent(const char *user);
usr.sbin/pw/pw_nis.c
39
pw_nisupdate(const char * path, struct passwd * pwd, char const * user)
usr.sbin/pw/pw_nis.c
49
if (user != NULL)
usr.sbin/pw/pw_nis.c
50
old_pw = GETPWNAM(user);
usr.sbin/pw/pw_user.c
425
pw_homepolicy(struct userconf * cnf, char *homedir, const char *user)
usr.sbin/pw/pw_user.c
434
snprintf(home, sizeof(home), "%s/%s", cnf->home, user);
usr.sbin/pw/pw_user.c
510
pw_password(struct userconf * cnf, char const * user)
usr.sbin/pw/pw_user.c
529
printf("Password for '%s' is: ", user);
usr.sbin/pw/pw_user.c
535
strlcpy(pwbuf, user, sizeof(pwbuf));
usr.sbin/pw/pw_user.c
78
const char *user);
usr.sbin/pw/pw_user.c
80
static char *pw_password(struct userconf * cnf, char const * user);
usr.sbin/pw/pwupd.c
84
pw_update(struct passwd * pwd, char const * user)
usr.sbin/pw/pwupd.c
96
if (user != NULL)
usr.sbin/pw/pwupd.c
97
old_pw = GETPWNAM(user);
usr.sbin/quot/quot.c
187
struct user *usr;
usr.sbin/quot/quot.c
205
struct user *usr, *usrn;
usr.sbin/quot/quot.c
206
struct user *svusr;
usr.sbin/quot/quot.c
222
static struct user *
usr.sbin/quot/quot.c
225
struct user *usr;
usr.sbin/quot/quot.c
252
const struct user *u1 = v1, *u2 = v2;
usr.sbin/quot/quot.c
261
qsort((users), nusers, sizeof(struct user), cmpusers)
usr.sbin/quot/quot.c
267
struct user *usr;
usr.sbin/quot/quot.c
272
usr = user(uid);
usr.sbin/quot/quot.c
358
struct user *usr, *usrs;
usr.sbin/quot/quot.c
420
printf("%s\t", user(DIP(super, dp, di_uid))->name);
usr.sbin/quot/quot.c
71
static struct user *user(uid_t);